Sample records for computer networking courses

  1. Software Assisted Syllabus Preparation for Computer Networks Courses

    ERIC Educational Resources Information Center

    Ercan, Tuncay; Sahin, Yasar Guneri

    2007-01-01

    Course descriptions prepared by the lecturers in the beginning of the academic year do not get any feed back from the students enrolled it. These syllabuses are not only used for the future semesters, but also used by the other lecturers without even making any changes. This causes a negative effect on the student education since many of the…

  2. Motivating students' participation in a computer networks course by means of magic, drama and games.

    PubMed

    Hilas, Constantinos S; Politis, Anastasios

    2014-01-01

    The recent economic crisis has forced many universities to cut down expenses by packing students into large lecture groups. The problem with large auditoria is that they discourage dialogue between students and faculty and they burden participation. Adding to this, students in computer science courses usually find the field to be full of theoretical and technical concepts. Lack of understanding leads them to lose interest and / or motivation. Classroom experience shows that the lecturer could employ alternative teaching methods, especially for early-year undergraduate students, in order to grasp their interest and introduce basic concepts. This paper describes some of the approaches that may be used to keep students interested and make them feel comfortable as they comprehend basic concepts in computer networks. The lecturing procedure was enriched with games, magic tricks and dramatic representations. This approach was used experimentally for two semesters and the results were more than encouraging. PMID:25105085

  3. Introductory computer science courses

    Microsoft Academic Search

    William G. Bulgren; Gregory F. Wetzel

    1982-01-01

    Many colleges and universities offer an introductory computer science course based on a specific programming language. The Department of Computer Science at the University of Kansas has recently reorganized its introductory computer science course to include such topics as algorithms, top-down algorithmic design, elementary programming techniques, and introduction to time-sharing. Besides the discussion of this transition, the paper discusses a

  4. Computer Networking Computer Networking

    E-print Network

    Rollins, Sami

    Protocol (IP) address. · Each message you send across the Internet contains the IP address of the receiver?) allows you to write a message then uses the Simple Mail Transfer Protocol (SMTP) to send your message Server friend #12;Computer Networking · SMTP exercises ­ MAIL FROM - specifies sender address ­ RCPT

  5. Networking Computers

    NSDL National Science Digital Library

    This tutorial provides a basic overview of the type of networks a computer can be part of. Students will gain an understanding of the different types of computer networks. Flash is required to view this interactive lesson.

  6. Network and Computer Security

    NSDL National Science Digital Library

    Rivest, Ronald L.

    A wide variety of educational resources and course materials are available through the Massachusetts Institute of Technologyâ??s Open Courseware Project. This particular course â??Network and Computer Securityâ?ť contains problem sets and exams with solutions as well as a full reading list that is accessible to the public. Some of the topics covered in this course are: cryptography, authentication and identification schemes, viruses, software protection, firewalls, and electronic commerce among others. Computer science students will find the reading materials and practice problems available here especially useful. This is an excellent source of information for anyone who is currently studying or interested in network and computer security.

  7. Engineering and Computing Undergraduate Courses

    E-print Network

    Low, Robert

    Faculty of Engineering and Computing Undergraduate Courses (including Architecture, Aerospace, Building, Civil Engineering and Mathematics) #12;2 Contents Coventry University 4 About Coventry 5 Facilities 6 Department of Computing 8 Department of Mathematics and Control Engineering 15 Department

  8. Instructing Faculty To Develop and Deliver Distance Courses with Computer Network Technology.

    ERIC Educational Resources Information Center

    Eastmond, Daniel V.; Lawrence, Betty H.

    1998-01-01

    Presents a typology of course-delivery techniques (technology as a supplement, conferencing technology as a supplement, and technology as the primary instructional mode) used by the Center for Distance Learning at the State University of New York Empire State College. Describes instructional considerations for each type and approaches used for…

  9. Course Syllabus ICS 51 -Introductory Computer Organization

    E-print Network

    Loudon, Catherine

    of computer systems to break it down into manageable tasks. In our study of computer systems, the following all the material of the course. GRADING Your grade in ICS 51 will depend on your performance on exams the lectures. COURSE OVERVIEW This course is a first introduction to computer system organization and assembly

  10. Advanced Optical Networks Course Type: Graduate Course

    E-print Network

    Arizona, University of

    for Optical Networks Light Transmission in Optical Fibers Signal Impairments Along the Lightpath Optical for Optical Networking Techniques for Space and Spectral Signal Processing ­ MIMO and OFDM Elastic Modulation

  11. CS281: Computer Systems Course Syllabus

    E-print Network

    Kretchmar, R. Matthew

    CS281: Computer Systems Course Syllabus General Info: Professor Matt Kretchmar Office 207 Olin.denison.edu/~kretchmar/281 Textbook Computer Systems, 2nd Ed by Bryant & O'Hallaron Course Goals: This course is designed to the readings, and diligent time management skills. The programming projects are large and chal- lenging

  12. Advanced Computer Networks

    NSDL National Science Digital Library

    Amy Apon

    The purpose of this class will be to focus on advanced topics in computer networking. The goal of this class is to prepare students to do research in networking or cluster computing, including employment in leading edge networking positions.

  13. Online Courses: MSU National Teachers Enhancement Network

    NSDL National Science Digital Library

    1900-01-01

    The National Teachers Enhancement Network (NTEN) offers online, graduate-level science courses from a world-class public research university. NTEN was one of the first online professional development programs for K-12 teachers, and has offered courses si

  14. ANU College of Engineering & Computer Science 2014 Course Selection Graduate Diploma of Computing 6706XGDCP

    E-print Network

    Zhou, Xiangyun "Sean"

    ANU College of Engineering & Computer Science 2014 Course Selection Graduate Diploma of Computing Systems or COMP6331 Computer Networks COMP6240 (6897) Relational Databases COMP6311 (8013) Software) Introductory Programming COMP6710 (8003) Introduction to Software Systems COMP6719 (4462) Computing

  15. Computer Science 78 Computer Networks or hacking the network, part II

    E-print Network

    Campbell, Andrew T.

    on network programming. The projects will run for the last two weeks of the course. There will be no lectures of experiments that will reinforce concepts taught in class through network programming assignmentsComputer Science 78 Computer Networks ­ or hacking the network, part II In what follows, we discuss

  16. Philosophy of Computer Science: An Introductory Course

    E-print Network

    Rapaport, William J.

    Philosophy of Computer Science: An Introductory Course William J. Rapaport Department of Computer Science and Engineering, Department of Philosophy, and Center for Cognitive Science State University://www.cse.buffalo.edu/rapaport/ June 21, 2005 1 #12;Philosophy of Computer Science: An Introductory Course Abstract There are many

  17. Course Material Selection Rubric for Creating Network Security Courses

    Microsoft Academic Search

    Matthew Marriotti

    2009-01-01

    Teaching network security can be a difficult task for university teachers,\\u000aespecially for teachers at smaller universities where the course loads are more\\u000adiverse. Creating a new course in network security requires investigation into\\u000amultiple subject areas within the field and from multiple sources. This task\\u000acan be daunting and overwhelming for teachers from smaller universities because\\u000aof their requirement

  18. Computer attitudes and the use of computers in psychology courses

    Microsoft Academic Search

    Margaret D. Anderson; Peter A. Hornby

    1996-01-01

    Students enrolled in four psychology courses in which computers were used for different purposes completed both pre- and postcourse\\u000a surveys regarding their prior computer experience, their attitudes toward computers, and their locus of control. A fifth psychology\\u000a course in which computers were not used served as a control. Results showed that participation in the courses that involved\\u000a computer activities led

  19. Network Programming 1 Computer Networks

    E-print Network

    Verschelde, Jan

    Network Programming 1 Computer Networks client/server architecture, protocols, and sockets 2 Network Programming a simple client/server interaction the module socket in Python 3 Monte Carlo Verschelde, 30 October 2013 Scientific Software (MCS 507 L-28) network programming 30 October 2013 1 / 43 #12

  20. A Crash Course in Computer Tom Chothia

    E-print Network

    Chothia, Tom

    .. Protection methods Locks, walls, armed guards, ... Crypto, Protocols, Security Audits,... #12;Today's LectureA Crash Course in Computer Security Tom Chothia Introduction Lecture 1 #12;Today's Lecture · An introduction to the module · Lecture schedule. · Module details. #12;A Crash Course in Computer Security

  1. Establishing network computer forensics classes

    Microsoft Academic Search

    Louise L. Soe; Dan Manson; Marcy Wright

    2004-01-01

    This paper discusses the deployment of computer forensics classes at undergraduate and graduate levels in a shared classroom\\/lab environment. The course content combined broad-based computer forensics theory and practice with hands-on forensics tools, including networked EnCase Enterprise forensics software. Our discussion covers teaching and learning issues from the perspectives of the instructors and the graduate and undergraduate students. Lessons learned

  2. Computational Verb Neural Networks

    Microsoft Academic Search

    Tao Yang

    2007-01-01

    When any attribute value in a conventional neural network is verbified, the result is a computational verb neural network(VNN). We can verbify inputs, outputs, biases, weights and many other attributes of conventional neural networks. In this paper, we reported two types of VNNs. The first one consists of computational verb inputs and numerical output. The second one consists of computational

  3. Promoting social networks among Computer Science students

    Microsoft Academic Search

    Kathrin Figl; Sonja Kabicher; Katharina Toifl

    2008-01-01

    The main scientific aim of this study was to investigate how Computer Science students regarded their social networks among study colleagues. The study was conducted at the Research Lab for Educational Technologies (University of Vienna) in order to find connecting factors for improving students' networks by means of curricular design as well as in single courses. Social Networks drawings and

  4. CNT3004: Computer Network Concepts Spring 2011

    E-print Network

    Zou, Cliff C.

    Webpage: http://www.cs.ucf.edu/~czou/CNT3004/ Catalog Course Description: Network media, protocol, current, to overview selected protocols associated with the Application, Transport, Network, Link, and Physical Layers of the OSI Reference Model and to show how these protocols are organized to produce computer networks

  5. CNT3004: Computer Network Concepts Summer 2012

    E-print Network

    Zou, Cliff C.

    Webpage: http://www.cs.ucf.edu/~czou/CNT3004/ Catalog Course Description: Network media, protocol, current, to overview selected protocols associated with the Application, Transport, Network, Link, and Physical Layers of the OSI Reference Model and to show how these protocols are organized to produce computer networks

  6. The Changes in Computer Anxiety in a Required Computer Course.

    ERIC Educational Resources Information Center

    Kolehmainen, Paivi

    The purpose of the study is to investigate the changes in computer anxiety, attitudes towards computers, and feelings related to computers among students due to participation in the basic course of computer science. The theoretical background is based on theories of human-computer interaction, test anxiety, and resistance to change. The subjects…

  7. The Educational Computing Course. [SITE 2002 Section].

    ERIC Educational Resources Information Center

    Bump, Wren, Ed.

    This document contains the following papers on the educational computing course from the SITE (Society for Information Technology & Teacher Education) 2002 conference: (1) "Integrating Media Literacy into a Technology Course for Preservice Secondary Teachers" (Gregg Brownell and Nancy Brownell); (2) "From Video Tutors to Electronic Portfolios:…

  8. 1. Parallel Computations Course on "Scalable Computing". Vittorio Scarano 1: Parallel Computations

    E-print Network

    Scarano, Vittorio

    on "Scalable Computing". Vittorio Scarano Introduction The Universe is Parallel "Massively" parallel 9/91 11. Parallel Computations Course on "Scalable Computing". Vittorio Scarano 1: Parallel Computations 1/91 1. Parallel Computations Course on "Scalable Computing". Vittorio Scarano Plan 1 Course

  9. School of Meteorology Course Computational Fluid Dynamics

    E-print Network

    Droegemeier, Kelvin K.

    School of Meteorology Course Fall 2013 Computational Fluid Dynamics METR 5344 Instructor: Prof Equations in Geophysical Fluid Dynamics by Dale R. Durran. Computational Techniques for Fluid Dynamics (1991 teaches the background theories and numerical methods for solving fluid dynamics and related problems

  10. A survey of computer science capstone course literature

    Microsoft Academic Search

    Robert F. Dugan Jr.

    2011-01-01

    In this article, we surveyed literature related to undergraduate computer science capstone courses. The survey was organized around course and project issues. Course issues included: course models, learning theories, course goals, course topics, student evaluation, and course evaluation. Project issues included: software process models, software process phases, project type, documentation, tools, groups, and instructor administration. We reflected on these issues

  11. Application of mini case study in Computer Networks

    Microsoft Academic Search

    Ganlin Wang; Runyuan Yin; Xiaohua Yuan

    2011-01-01

    For the abstract concepts and complex theories in Computer Networks, this paper introduced a mini case study approach as teaching aids in the course of Computer Networks. A virtual network experiment environment for mini cases was built with the software of VMware, and the cases were analyzed by the Wireshark. The cases of simple network communication and TCP protocol analysis

  12. Computer Network Resources for Physical Geography Instruction.

    ERIC Educational Resources Information Center

    Bishop, Michael P.; And Others

    1993-01-01

    Asserts that the use of computer networks provides an important and effective resource for geography instruction. Describes the use of the Internet network in physical geography instruction. Provides an example of the use of Internet resources in a climatology/meteorology course. (CFR)

  13. Computational sensor networks

    Microsoft Academic Search

    Thomas C. Henderson; Christopher A. Sikorski; Edward Grant; Kyle Luthy

    2007-01-01

    We propose Computational Sensor Networks as a methodology to exploit models of physical phe- nomena in order to better understand the structure of the sensor network. To do so, it is necessary to relate changes in the sensed variables (e.g., temperature) to the aspect of interest in the sensor network (e.g., sensor node position, sensor bias, etc.), and to develop

  14. Classroom Computer Network.

    ERIC Educational Resources Information Center

    Lent, John

    1984-01-01

    This article describes a computer network system that connects several microcomputers to a single disk drive and one copy of software. Many schools are switching to networks as a cheaper and more efficient means of computer instruction. Teachers may be faced with copywriting problems when reproducing programs. (DF)

  15. K-12 Computer Networking.

    ERIC Educational Resources Information Center

    ERIC Review, 1993

    1993-01-01

    The "ERIC Review" is published three times a year and announces research results, publications, and new programs relevant to each issue's theme topic. This issue explores computer networking in elementary and secondary schools via two principal articles: "Plugging into the 'Net'" (Michael B. Eisenberg and Donald P. Ely); and "Computer Networks for…

  16. Computers and society: a proposed course for computer scientists

    Microsoft Academic Search

    Ellis Horowitz; Howard L. Morgan; Alan C. Shaw

    1972-01-01

    The purpose of this paper is to describe a course concerned with both the effects of computers on society and the responsibilities of computer scientists to society. The impact of computers is divided into five components: political, economic, cultural, social, and moral; the main part of the paper defines each component and presents examples of the relevant issues. In the

  17. Computer Science Adjunct Faculty Position for Computer Networks and Database Systems

    E-print Network

    Plotkin, Joshua B.

    Computer Science Adjunct Faculty Position for Computer Networks and Database Systems Connecticut College is seeking an adjunct professor (rank open) of computer science to teach Computer Networks (COM315 have a Masters or equivalent in Computer Science or related field. The catalog course descriptions

  18. Experience with a “universal” introductory course in computer science

    Microsoft Academic Search

    T. Sterling; S. Pollack

    1970-01-01

    The increased demand for some type of introductory computing\\/computer science course does not stem solely from computer science epartments. A variety of other disciplines re discovering that the adequate training of computer users involves more than a short course in a programming language. Consequently, there is a need for a basic course sequence that: 1. Teaches the fundamentals of computing

  19. Hyperswitch Communication Network Computer

    NASA Technical Reports Server (NTRS)

    Peterson, John C.; Chow, Edward T.; Priel, Moshe; Upchurch, Edwin T.

    1993-01-01

    Hyperswitch Communications Network (HCN) computer is prototype multiple-processor computer being developed. Incorporates improved version of hyperswitch communication network described in "Hyperswitch Network For Hypercube Computer" (NPO-16905). Designed to support high-level software and expansion of itself. HCN computer is message-passing, multiple-instruction/multiple-data computer offering significant advantages over older single-processor and bus-based multiple-processor computers, with respect to price/performance ratio, reliability, availability, and manufacturing. Design of HCN operating-system software provides flexible computing environment accommodating both parallel and distributed processing. Also achieves balance among following competing factors; performance in processing and communications, ease of use, and tolerance of (and recovery from) faults.

  20. Computer Systems and Network Manager

    E-print Network

    Computer Systems and Network Manager Fort Collins, Colorado POSITION A Computers Systems activities. RESPONSIBILITIES The successful candidate will perform computer systems and network administration, including computer hardware, systems software, applications software, and all configurations

  1. The Impact of a Computers and Society Course on Student Perspectives.

    ERIC Educational Resources Information Center

    Nicholson, P. J.; And Others

    A course at the University of Minnesota entitled "Perspectives on Computers and Society" explores the social significance of computers. Topics covered include public perceptions of computers, biological and artificial information processing, the economics and technology of hardware, computer networks and software, data banks and the right to…

  2. Course Goals in Computer Education, K-12.

    ERIC Educational Resources Information Center

    Allenbrand, Bob, Ed.; And Others

    Designed to be used in conjunction with a school district's educational goals and focusing on what is to be learned rather than the methodology to be used, the program and course goals presented here are intended as guidelines for planning and evaluating elementary and secondary school curricula in computer education. Of four possible levels of…

  3. Computers, Networks and Work.

    ERIC Educational Resources Information Center

    Sproull, Lee; Kiesler, Sara

    1991-01-01

    Discussed are how computer networks can affect the nature of work and the relationships between managers and employees. The differences between face-to-face exchanges and electronic interactions are described. (KR)

  4. A Preliminary Evaluation of the new Cisco Network Security Course

    Microsoft Academic Search

    Stanislaw Maj; David Veal; Lotfi Yassa

    2010-01-01

    The Cisco Network Academy Program (CNAP) is a global education program that offers a range of course suitable for high schools, college students and practicing professionals. The recently introduced Cisco Certified Network Associate (CCNA) Security course, builds upon the foundation Cisco Certified Network Associate (CCNA) course, and is designed to provide core security concepts and the practical skills to design

  5. Goethe Gossips with Grass: Using Computer Chatting Software in an Introductory Literature Course.

    ERIC Educational Resources Information Center

    Fraser, Catherine C.

    1999-01-01

    Students in a third-year introduction to German literature course chatted over networked computers, using "FirstClass" software. A brief description of the course design is provided with detailed information on how the three chat sessions were organized. (Author/VWL)

  6. Evaluating Curriculum Changes in a Computing Service Course.

    ERIC Educational Resources Information Center

    Johnson, Glenn T.; Leonard, Rosemary J.

    1994-01-01

    A study investigated the degree to which changes made in a traditional introductory computer course addressed student expectations. The revised curriculum focused on computer literacy and computer awareness rather than programming skills. Evaluation suggests that, although neither course realized student expectations fully, the revised course

  7. Educational Computer Networks: An Overview.

    ERIC Educational Resources Information Center

    Crume, Charles E.; Maddux, Cleborne D.

    1990-01-01

    Describes the growth of educational computer networks in three main categories: (1) networks for sharing peripheral equipment; (2) networks for exchanging information; and (3) networks for addressing instructional needs. The use of microcomputers and mainframe computers is examined, networks in public schools and universities are described, and…

  8. Offline computing and networking

    SciTech Connect

    Appel, J.A.; Avery, P.; Chartrand, G.; Day, C.T.; Gaines, I.; Georgiopoulos, C.H.; Gilchriese, M.G.D.; Goldman, H.; Hoftun, J.; Linglin, D.

    1985-01-01

    This note summarizes the work of the Offline Computing and Networking Group. The report is divided into two sections; the first deals with the computing and networking requirements and the second with the proposed way to satisfy those requirements. In considering the requirements, we have considered two types of computing problems. The first is CPU-intensive activity such as production data analysis (reducing raw data to DST), production Monte Carlo, or engineering calculations. The second is physicist-intensive computing such as program development, hardware design, physics analysis, and detector studies. For both types of computing, we examine a variety of issues. These included a set of quantitative questions: how much CPU power (for turn-around and for through-put), how much memory, mass-storage, bandwidth, and so on. There are also very important qualitative issues: what features must be provided by the operating system, what tools are needed for program design, code management, database management, and for graphics.

  9. A CAD (Classroom Assessment Design) of a Computer Programming Course

    ERIC Educational Resources Information Center

    Hawi, Nazir S.

    2012-01-01

    This paper presents a CAD (classroom assessment design) of an entry-level undergraduate computer programming course "Computer Programming I". CAD has been the product of a long experience in teaching computer programming courses including teaching "Computer Programming I" 22 times. Each semester, CAD is evaluated and modified for the subsequent…

  10. Online Courses: MSU National Teachers Enhancement Network (NTEN)

    NSDL National Science Digital Library

    1900-01-01

    The National Teachers Enhancement Network (NTEN) offers online, graduate-level science courses from a world-class public research university. NTEN was one of the first online professional development programs for K-12 teachers, and has offered courses sin

  11. Computer Design in an Introductory Course--Part II.

    ERIC Educational Resources Information Center

    Spoerri, Peter

    1990-01-01

    Describes the use of a logic circuit simulator to design a computer in an introductory computer course. Discusses the design of a sequence generator, control circuits, and testing of a computer's instruction set. (YP)

  12. Virtual Network Computing

    NSDL National Science Digital Library

    The Virtual Network Computing software package, a product of AT&T Laboratories Cambridge, is one of the more useful and decidedly different utilities than generally appears in our Network Tools section. This software, although it is complex in nature and has a technical-sounding moniker, allows one to use just about any computer remotely across a local area network or even the Internet. To accomplish this remote use, the system actually displays the entire desktop of the remote computer in a window on the local computer. Amazingly, you can display and use a Macintosh desktop, for example, on your Win95/98/NT system or a Win95/98/NT desktop on your Unix system or any other combination of these possibilities. The system is simple to install and works quite well. Although minor bugs are noticeable, the system is complete enough to allow, for example, the remote use of many popular Windows programs on a Unix system. The VNC system is free to download and use and runs on Win95/98/NT, SPARC Solaris, Linux, and DEC Alpha OSF1. Beta versions of the software are also available for the Macintosh and Windows CE 2.x.

  13. Personality Predictors of Performance in an Introductory Computer Course

    Microsoft Academic Search

    Michael G. Aamodt

    The current study investigated the relationship between five individual difference measures and performance in an introductory computer course as compared to performance in an introductory psychology course. The results indicated that steadiness was related to computer exam performance whereas compliance and cognitive ability were related to psychology exam performance. No variables were able to predict performance on computer projects.

  14. An electromagnetics course with EMC applications for computer engineering students

    Microsoft Academic Search

    CHRISTOPHER W. TRUEMAN

    1990-01-01

    When computer engineering students follow a different (separate) program of study from the electrical engineering students, only a single course in engineering electromagnetics can be accommodated in the computer engineering (CE) core program. An outline for a course on electromagnetics for computer engineering is given combining traditional electromagnetics topics with definitions, concepts, and discussions drawn from EMC. In this way

  15. Integrating Emerging Topics through Online Team Design in a Hybrid Communication Networks Course: Interaction Patterns and Impact of Prior Knowledge

    ERIC Educational Resources Information Center

    Reisslein, Jana; Seeling, Patrick; Reisslein, Martin

    2005-01-01

    An important challenge in the introductory communication networks course in electrical and computer engineering curricula is to integrate emerging topics, such as wireless Internet access and network security, into the already content-intensive course. At the same time it is essential to provide students with experiences in online collaboration,…

  16. Computer Networks and Networking: A Primer.

    ERIC Educational Resources Information Center

    Collins, Mauri P.

    1993-01-01

    Provides a basic introduction to computer networks and networking terminology. Topics addressed include modems; the Internet; TCP/IP (Transmission Control Protocol/Internet Protocol); transmission lines; Internet Protocol numbers; network traffic; Fidonet; file transfer protocol (FTP); TELNET; electronic mail; discussion groups; LISTSERV; USENET;…

  17. Vendor neutral hands-on labs using open-source products for wireless networks courses

    Microsoft Academic Search

    Hetal Jasani

    2010-01-01

    In this paper, an undergraduate computer information technology special topic course in mobile and wireless networks is presented which is developed based on many hands-on lab activities. In learning the concepts of wireless networks via hands-on labs, students get ample opportunities to understand the underlying principles and concepts of wireless networks. These hands-on labs are chosen to provide sufficient challenges

  18. Mobile Computing/Mobile Computing/Mobile Computing/Mobile Computing/ Mobile NetworksMobile NetworksMobile NetworksMobile Networks

    E-print Network

    Yu, Chansu

    frequently 8 Mobile IP Overview Goal Mobile wireless computers can attach to the Internet and remain attachedMobile Computing/Mobile Computing/Mobile Computing/Mobile Computing/ Mobile NetworksMobile NetworksMobile NetworksMobile Networks Mobile IP Prof. Chansu Yu 2 Contents IP for Wired Network Mobile IP Overview Basic

  19. Syllabus -Fall 2014 Course CSCI-6948: Frontier of Network Science

    E-print Network

    Varela, Carlos

    Syllabus - Fall 2014 Course CSCI-6948: Frontier of Network Science CRN: 68658, 3 credits Wednesday on class notes and the online textbook by Albert Laszlo Barabasi titled Network Science Book Project-depth discussion of fundamental concepts of network science with research seminars on advance topics related

  20. Of Bugs, Bytes, LANS and Viruses: The Changing Countenance of Computer Courses in Administrator Preparation Programs.

    ERIC Educational Resources Information Center

    Holloway, William H.

    Instruction in computing over the past three decades has experienced dramatic changes in both method and substance. Beginning with on-the-job training, courses evolved to become highly sophisticated and widespread in education. The second decade, the 70's, focused on mainframe use, and the third decade on micros and widely networked systems.…

  1. Eradicating Computer Viruses on Networks

    E-print Network

    Huang, Jinyu

    2012-01-01

    Spread of computer viruses can be modeled as the SIS (susceptible-infected-susceptible) epidemic propagation. We show that in order to ensure the random immunization or the targeted immunization effectively prevent computer viruses propagation on homogeneous networks, we should install antivirus programs in every computer node and frequently update those programs. This may produce large work and cost to install and update antivirus programs. Then we propose a new policy called "network monitors" to tackle this problem. In this policy, we only install and update antivirus programs for small number of computer nodes, namely the "network monitors". Further, the "network monitors" can monitor their neighboring nodes' behavior. This mechanism incur relative small cost to install and update antivirus programs.We also indicate that the policy of the "network monitors" is efficient to protect the network's safety. Numerical simulations confirm our analysis.

  2. Social networks generate interest in computer science

    Microsoft Academic Search

    Casey Alt; Owen Astrachan; Jeffrey Forbes; Richard Lucic; Susan Rodger

    2006-01-01

    For forty years programming has been the foundation of introductory computer science. Despite exponential increases in computational power during this period, examples used in introductory courses have remained largely unchanged. The incredible growth in statistics courses at all levels, in contrast with the decline of students taking computer science courses, points to the potential for introducing computer science at many

  3. Network survivability performance (computer diskette)

    NASA Astrophysics Data System (ADS)

    1993-11-01

    File characteristics: Data file; 1 file. Physical description: 1 computer diskette; 3 1/2 in.; high density; 2.0MB. System requirements: Mac; Word. This technical report has been developed to address the survivability of telecommunications networks including services. It responds to the need for a common understanding of, and assessment techniques for network survivability, availability, integrity, and reliability. It provides a basis for designing and operating telecommunication networks to user expectations for network survivability.

  4. Tourism networks and computer networks

    E-print Network

    Baggio, Rodolfo

    2008-01-01

    The body of knowledge accumulated in recent years on the structure and the dynamics of complex networks has offered useful insights on the behaviour of many natural and artificial complex systems. The analysis of some of these, namely those formed by companies and institutions, however, has proved problematical mainly for the difficulties in collecting a reasonable amount of data. This contribution argues that the World Wide Web can provide an efficient and effective way to gather significant samples of networked socio-economic systems to be used for network analyses and simulations. The case discussed refers to a tourism destination, the fundamental subsystem of an industry which can be considered one of the most important in today's World economy.

  5. "Horses for Courses": Categories of Computer-Based Learning Program and Their Uses in Pharmacology Courses.

    ERIC Educational Resources Information Center

    Hughes, Ian E.

    1998-01-01

    Describes the pharma-CAL-ogy project, funded by Teaching and Learning Technology Programme (TLTP), which has developed various types of software for use in pharmacology courses. Topics include course organization and delivery software, drill and practice software, tutorial-type programs, simulations, and the need to integrate computer-assisted…

  6. Strategies for encouraging individual achievement in introductory computer science courses

    Microsoft Academic Search

    Eric Roberts

    2000-01-01

    Provide extensive opportunities for extra-credit work. In my introductory courses, students have many opportunities to go beyond the course requirements and undertake more challenging tasks. The primary forms for these extra-credit opportunities are open-ended extensions on assignments and programming contests. Students in introductory computer science courses often vary widely in background and ability. As a result, some students are bored

  7. A Laboratory Based Capstone Course in Computer Security for Undergraduates

    E-print Network

    O'Leary, Michael

    & Information Science Education]: Computer Science education, Curriculum General Terms Security, ExperimentationA Laboratory Based Capstone Course in Computer Security for Undergraduates Mike O'Leary Department of Computer and Information Science Towson University Towson, MD 21252 +1 410-704-4757 moleary

  8. Addressing Small Computers in the First OS Course

    ERIC Educational Resources Information Center

    Nutt, Gary

    2006-01-01

    Small computers are emerging as important components of the contemporary computing scene. Their operating systems vary from specialized software for an embedded system to the same style of OS used on a generic desktop or server computer. This article describes a course in which systems are classified by their hardware capability and the…

  9. A cornerstone course for Freshman computer science students

    Microsoft Academic Search

    Philip R. Prins; Charles H. Burris Jr

    1998-01-01

    “Why are we studying this?” “What area of Computer Science should I concentrate on?” “Are the really good Computer Scientists all hackers and nerds?” To answer questions like these and to attract young people seeking a career that will benefit society, we describe and make a case for, a Freshman seminar course for the Computer Science (CS) major. Just as

  10. Using An Instructional Operating System In Teaching Computer Security Courses

    E-print Network

    Du, Wenliang "Kevin"

    to design, implement, analyze, test, and operate a system or a net- work to achieve security. Pedagogical tested code, and that until this gap is addressed "security problems will continue to plague computer security are the two core courses. These courses teach students how to design, implement, analyze, test

  11. A Computer-Guided, General-Education Physics Course

    ERIC Educational Resources Information Center

    Kromhout, Ora M.; and others

    1969-01-01

    Describes the development of an autonomous computer-Assisted-Instruction general physics course for liberal-arts students at Florida State University. The course utilizes an IBM 1500 Instructional System to guide the student through a self-paced program of textbook reading assignments and homework problems, audiotaped lectures, PSSC movies, and…

  12. Student Learning Networks on Residential Field Courses: Does Size Matter?

    ERIC Educational Resources Information Center

    Langan, A. Mark; Cullen, W. Rod; Shuker, David M.

    2008-01-01

    This article describes learner and tutor reports of a learning network that formed during the completion of investigative projects on a residential field course. Staff and students recorded project-related interactions, who they were with and how long they lasted over four phases during the field course. An enquiry based learning format challenged…

  13. Graduate school introductory computational simulation course pedagogy

    E-print Network

    Proctor, Laura L. (Laura Lynne), 1975-

    2009-01-01

    Numerical methods and algorithms have developed and matured vastly over the past three decades now that computational analysis can be performed on almost any personal computer. There is a need to be able to teach and present ...

  14. A Video- and Computer-Aided Course.

    ERIC Educational Resources Information Center

    Jun, Huang

    1987-01-01

    A shortage of English teachers at Jinan University led to video and computers being used to present lessons and provide written exercises and tests. A sample computer-based lesson on reading comprehension is appended. (Author/CB)

  15. Social networks generate interest in computer science

    Microsoft Academic Search

    Casey Alt; Owen L. Astrachan; Jeffrey Forbes; Richard Lucic; Susan H. Rodger

    2006-01-01

    For forty years programming has been the foundation of in- troductory computer science. Despite exponential increases in computational power during this period, examples used in introductory courses have remained largely unchanged. The incredible growth in statistics courses at all levels, in contrast with the decline of students taking computer sci- ence courses, points to the potential for introducing com- puter

  16. Deterrents to women taking computer science courses

    Microsoft Academic Search

    SYLVIA BEYER; KRISTINA RYNES; SUSAN HALLER

    2004-01-01

    The United States faces a shortage of computer scientists. Despite the current economic downturn, the most recent estimate indicates a labor force shortage of IT professionals. The shortage of IT professionals, and especially of computer scientists, provides impetus for increasing the representation of women in computer science (CS). We examine why so few students, and particularly few women, choose to

  17. Computer-Supported Negotiation of Course Content

    ERIC Educational Resources Information Center

    Hubscher, Roland

    2009-01-01

    Students learn more effectively with personally meaningful tasks. Thus, students learn more if they have a say in deciding what specific topics and examples are being discussed in class. Naturally, the instructor knows what topics are important to cover in a course and which ones might be optional. Finding the right balance between students'…

  18. The Course as Token: A Construction of/by Networks.

    ERIC Educational Resources Information Center

    Gaskell, Jim; Hepburn, Gary

    1998-01-01

    Describes the way in which a new applied-physics course introduced in British Columbia as part of a program in applied academics can be seen to construct different networks in different contexts. Employs actor network theory (ANT). Contains 20 references. (DDR)

  19. Evaluating Programming Ability in an Introductory Computer Science Course

    E-print Network

    Chamillard, Tim

    , programming evaluation, introductory computer science, collaborative learning. 1 Introduction ProfessorsEvaluating Programming Ability in an Introductory Computer Science Course A.T. Chamillard.af.mil Abstract There are numerous ways to evaluate student programming ability, all of which have benefits

  20. Integration of Computers into a Course on Biostatistics

    ERIC Educational Resources Information Center

    Gjerde, Craig L.

    1977-01-01

    The biostatistics course for undergraduate medical and dental students at the University of Connecticut Health Center is taught by the Keller Plan, and students can use computers to analyze data sets and to score their unit tests. The computer is an essential tool for data analysis and an attractive option for test scoring. (LBH)

  1. Computer Mediated Tutorial Support for Conventional University Courses.

    ERIC Educational Resources Information Center

    Light, Paul; Colbourn, C.; Light, V.

    1997-01-01

    Psychology students at the University of Southampton use "skywriting," an e-mail based discussion medium involving tutors and students and focusing on issues arising from course content. This article discusses student participation in skywriting; examines effects of gender, computer attitudes, and computer experience; compares student contribution…

  2. Using Computers in Undergraduate Economics Courses.

    ERIC Educational Resources Information Center

    Barr, Saul Z.; Harmon, Oscar

    Seven computer assignments for undergraduate economics students that concentrate on building a foundation for programming higher level mathematical calculations are described. The purpose of each assignment, the computer program for it, and the correct answers are provided. "Introduction to Text Editing" acquaints the student with some basic…

  3. Computer Graphics for Engineers Course Aim

    E-print Network

    Yuen, Shiu Yin, Kelvin

    texture mapping and animation techniques (CILO5) Create an animation or a game using computer graphics Applications Game Industry Advertising Industry Design Industry Virtual Reality Visualization Training Education Computer Art Partial list of CG companies in Hong Kong http://www.cgvisual.com/links/html/CGVlinks_hk_APP

  4. Computer Networks: Prospects for Scientists.

    ERIC Educational Resources Information Center

    Newell, Allen; Sproull, Robert F.

    1982-01-01

    Reviews the nature of computer networks and previews their development by focusing on ways they are useful to scientists and to science, including applications for remote computer access, electronic mail, bulletin boards, teleconferencing, file transfer, resource sharing, and imbedding nontextual communications. (JN)

  5. Computing on Anonymous Quantum Network

    E-print Network

    Hirotada Kobayashi; Keiji Matsumoto; Seiichiro Tani

    2010-01-29

    This paper considers distributed computing on an anonymous quantum network, a network in which no party has a unique identifier and quantum communication and computation are available. It is proved that the leader election problem can exactly (i.e., without error in bounded time) be solved with at most the same complexity up to a constant factor as that of exactly computing symmetric functions (without intermediate measurements for a distributed and superposed input), if the number of parties is given to every party. A corollary of this result is a more efficient quantum leader election algorithm than existing ones: the new quantum algorithm runs in O(n) rounds with bit complexity O(mn^2), on an anonymous quantum network with n parties and m communication links. Another corollary is the first quantum algorithm that exactly computes any computable Boolean function with round complexity O(n) and with smaller bit complexity than that of existing classical algorithms in the worst case over all (computable) Boolean functions and network topologies. More generally, any n-qubit state can be shared with that complexity on an anonymous quantum network with n parties.

  6. How do connectionist networks compute?

    PubMed

    O'Brien, Gerard; Opie, Jon

    2006-03-01

    Although connectionism is advocated by its proponents as an alternative to the classical computational theory of mind, doubts persist about its computational credentials. Our aim is to dispel these doubts by explaining how connectionist networks compute. We first develop a generic account of computation-no easy task, because computation, like almost every other foundational concept in cognitive science, has resisted canonical definition. We opt for a characterisation that does justice to the explanatory role of computation in cognitive science. Next we examine what might be regarded as the "conventional" account of connectionist computation. We show why this account is inadequate and hence fosters the suspicion that connectionist networks are not genuinely computational. Lastly, we turn to the principal task of the paper: the development of a more robust portrait of connectionist computation. The basis of this portrait is an explanation of the representational capacities of connection weights, supported by an analysis of the weight configurations of a series of simulated neural networks. PMID:16628464

  7. LINCS: Livermore's network architecture. [Octopus computing network

    SciTech Connect

    Fletcher, J.G.

    1982-01-01

    Octopus, a local computing network that has been evolving at the Lawrence Livermore National Laboratory for over fifteen years, is currently undergoing a major revision. The primary purpose of the revision is to consolidate and redefine the variety of conventions and formats, which have grown up over the years, into a single standard family of protocols, the Livermore Interactive Network Communication Standard (LINCS). This standard treats the entire network as a single distributed operating system such that access to a computing resource is obtained in a single way, whether that resource is local (on the same computer as the accessing process) or remote (on another computer). LINCS encompasses not only communication but also such issues as the relationship of customer to server processes and the structure, naming, and protection of resources. The discussion includes: an overview of the Livermore user community and computing hardware, the functions and structure of each of the seven layers of LINCS protocol, the reasons why we have designed our own protocols and why we are dissatisfied by the directions that current protocol standards are taking.

  8. CS 432/532 -Computer and Network Security Spring 2013

    E-print Network

    Levi, Albert

    on security applications and cryptographic protocols. An overview of cryptography will be given in the firstCS 432/532 - Computer and Network Security Spring 2013 This is a 3-credit course that focuses, the topics are undergraduate topics and the exams/homework assignments will be designed with the assumption

  9. Creating a Computer Science Canon: a Course of "Classic" Readings in Computer Science

    E-print Network

    Eisenberg, Michael A.

    Creating a Computer Science Canon: a Course of "Classic" Readings in Computer Science Michael Eisenberg Department of Computer Science and Institute of Cognitive Science University of Colorado Boulder, CO 80309-0430 duck@cs.colorado.edu Abstract Computer science has a reputation of being a discipline

  10. Collective network for computer structures

    DOEpatents

    Blumrich, Matthias A; Coteus, Paul W; Chen, Dong; Gara, Alan; Giampapa, Mark E; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E; Steinmacher-Burow, Burkhard D; Vranas, Pavlos M

    2014-01-07

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to the needs of a processing algorithm.

  11. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    ERIC Educational Resources Information Center

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer

  12. Demonstrations of Neural Network Computations Involving Students

    PubMed Central

    May, Christopher J.

    2010-01-01

    David Marr famously proposed three levels of analysis (implementational, algorithmic, and computational) for understanding information processing systems such as the brain. While two of these levels are commonly taught in neuroscience courses (the implementational level through neurophysiology and the computational level through systems/cognitive neuroscience), the algorithmic level is typically neglected. This leaves an explanatory gap in students’ understanding of how, for example, the flow of sodium ions enables cognition. Neural networks bridge these two levels by demonstrating how collections of interacting neuron-like units can give rise to more overtly cognitive phenomena. The demonstrations in this paper are intended to facilitate instructors’ introduction and exploration of how neurons “process information.” PMID:23493501

  13. Multimedia Instructional Tools and Student Learning in Computer Applications Courses

    ERIC Educational Resources Information Center

    Chapman, Debra Laier

    2013-01-01

    Advances in technology and changes in educational strategies have resulted in the integration of technology into the classroom. Multimedia instructional tools (MMIT) have been identified as a way to provide student-centered active-learning instructional material to students. MMITs are common in introductory computer applications courses based on…

  14. Visualizing Trends in Student Performance Across Computer Science Courses

    E-print Network

    Rheingans, Penny

    Visualizing Trends in Student Performance Across Computer Science Courses Dana Wortman University. Keeping strong students and helping struggling students perform better are two fun- damental components. Copyright 2007 ACM 1-59593-361-1/07/0003 ...$5.00. Keywords CS1, CS2, Visualization, Student Performance

  15. Effects of a Television Distance Education Course in Computer Science.

    ERIC Educational Resources Information Center

    Boulet, Marie-Michele; Boudreault, Serge; Guerette, Louis

    1998-01-01

    Presents an analysis of the learning outcomes pertaining to one unit of the undergraduate television distance-education course, Information Technology, in the computer science program at University Laval (Quebec, Canada). Investigates the relative effects of television distance education versus tradition classroom teaching on learning…

  16. Learning Approaches of Adult Students Taking Computer Conferencing Courses.

    ERIC Educational Resources Information Center

    Eastmond, Daniel V.

    This research, begun in Fall 1991, explored the learning-to-learn strategies of adult students taking computer conferencing courses for college credit. It investigated how these students define effective learning and how they direct their own learning and lifestyles to meet the unique demands of this medium. This research gathered data through…

  17. Civil Engineering Professional Courses Collaborative Recommendation System Based on Network

    Microsoft Academic Search

    Zhang Xiaoquan

    2009-01-01

    Network environment provides a uniform learning platform for the students in the major of civil engineering and for their teachers. Collaborative recommendation system structure of civil engineering professional courses has been put forward and two core algorithms - knowledge matching and adaptability - are designed on the base of students' personal learning needs and a strong systematicness for civil engineering

  18. Performance in an Introductory Computer Programming Course as a Predictor of Future Success for Engineering and Computer Science Majors

    Microsoft Academic Search

    Barbara T. Pioro

    In most schools, introductory computer programming courses are required for computer science as well as all engineering majors. It is generally believed that the programming courses are not just about programming per se, but that they provide a forum for teaching precise and logical thought processes. Computer programming courses constitute a necessary background for computer science majors by introducing basic

  19. Impact of Multimedia and Network Services on an Introductory Level Course

    NASA Technical Reports Server (NTRS)

    Russ, John C.

    1996-01-01

    We will demonstrate and describe the impact of our use of multimedia and network connectivity on a sophomore-level introductory course in materials science. This class services all engineering students, resulting in large (more than 150) class sections with no hands-on laboratory. In 1990 we began to develop computer graphics that might substitute for some laboratory or real-world experiences, and demonstrate relationships hard to show with static textbook images or chalkboard drawings. We created a comprehensive series of modules that cover the entire course content. Called VIMS (Visualizations in Materials Science), these are available in the form of a CD-ROM and also via the internet.

  20. Neurons and Neural Networks: Computational

    E-print Network

    Nadim, Farzan

    Neurons and Neural Networks: Computational Models Farzan Nadim,New Jersey Institute of Technology be used to build abstract models of the electrical signalling in single neurons and among neurons of neurons is their complex electrical and chemical interactions that lead to the formation of neuronal

  1. Mission impossible? [FBI computer network

    Microsoft Academic Search

    J. Kumagai

    2003-01-01

    With a new computer network automated investigative tools, and more channels for sharing information, the FBI hopes to finally know what it knows. The fall of 2001 saw the start of an ambitious program of modernization, which seems to recognize that the barriers that prevent the FBI from analyzing and sharing data are as much cultural as technological. These include

  2. Innovative and easy-to-deploy communication networking laboratory experiments for electrical and computer engineering students

    Microsoft Academic Search

    Catherine Rosenberg; Simon G. M. Koo

    2002-01-01

    This paper describes a set of new laboratory experiments developed for the senior level undergraduate networking course at the School of Electrical and Computer Engineering, Purdue University. These experiments differ from existing networking experiments in that they emphasize the understanding of the dynamics of network protocols in addition to their applications, which makes them more suitable for ECE curricula. Students

  3. The Design and Implementation of Behavior-Driven Artificial Neural Network Computing System

    Microsoft Academic Search

    Yongbin Zhang; Liangbin Zheng; Fucheng You

    2009-01-01

    A behavior-driven artificial neural network computing system is presented to solve problems occurred in artificial neural network course. With this system, users will concentrate their efforts on algorithms instead of computing environment, and can define arbitrary learning algorithms at any time, and submit the work to the server to execute. The server can load the work dynamically. When finishing executing

  4. A statistical analysis of student performance in online computer science courses

    Microsoft Academic Search

    Merry McDonald; Brian Dorn; Gary McDonald

    2004-01-01

    During the past few years the number of courses offered online has greatly increased as technology has made delivery of such courses feasible. This paper discusses the experiences of the authors in teaching online courses for upper-division computer science students and reports results of a study comparing success of students in online courses to students in traditional courses.

  5. Quantum computing in neural networks

    E-print Network

    P. Gralewicz

    2004-02-11

    According to the statistical interpretation of quantum theory, quantum computers form a distinguished class of probabilistic machines (PMs) by encoding n qubits in 2n pbits (random binary variables). This raises the possibility of a large-scale quantum computing using PMs, especially with neural networks which have the innate capability for probabilistic information processing. Restricting ourselves to a particular model, we construct and numerically examine the performance of neural circuits implementing universal quantum gates. A discussion on the physiological plausibility of proposed coding scheme is also provided.

  6. Introducing Network Programming into a CS1 Course Michael H. Goldwasser

    E-print Network

    Letscher, David

    Introducing Network Programming into a CS1 Course Michael H. Goldwasser Dept. Mathematics describe our experi- ences doing network programming in a CS1 course taught in Python. The simplicity University, we have added a segment on basic network programming lasting a week or week and a half. Network

  7. Delayed commutation in quantum computer networks.

    PubMed

    García-Escartín, Juan Carlos; Chamorro-Posada, Pedro

    2006-09-15

    In the same way that classical computer networks connect and enhance the capabilities of classical computers, quantum networks can combine the advantages of quantum information and communication. We propose a nonclassical network element, a delayed commutation switch, that can solve the problem of switching time in packet switching networks. With the help of some local ancillary qubits and superdense codes, we can route a qubit packet after part of it has left the network node. PMID:17025870

  8. Raj JainThe Ohio State University Computer NetworkingComputer Networking

    E-print Network

    Jain, Raj

    2 Stone Age toStone Age to Networking AgeNetworking Age Microwave ovens, stereo, VCRs, had some JainThe Ohio State University 5 OverviewOverview Review of Networking: Ethernet, Bridging Datalink:30-9:00 Course Introduction 8:30-10:15 Review of Networking: Ethernet 10:15-10:30 Coffee Break 10

  9. Every student majoring in computer science is required to take at least one systems course (CPSC 213). Most go on to take 313, and over half take 317.

    E-print Network

    Knorr, Edwin M.

    more active learning in lectures, labs, and tutorials. 7. Where appropriate, collect baseline data 213). Most go on to take 313, and over half take 317. In addition, our data structures course (221 experience with transforming other courses--namely CPSC 317 (Computer Networking) and CPSC 259 (Data

  10. We claim this class for computer science: a non-mathematician's discrete structures course

    Microsoft Academic Search

    Adrienne Decker; Phil Ventura

    2004-01-01

    We have recently launched a reorganized discrete structures course being taught in the computer science department for computer science majors. The main idea of the reorganization is to make the course relevant and productive for the computer science students. During the Spring of 2003, students who were taking both discrete structures and CS2 commented that taking both courses at the

  11. Software For Monitoring A Computer Network

    NASA Technical Reports Server (NTRS)

    Lee, Young H.

    1992-01-01

    SNMAT is rule-based expert-system computer program designed to assist personnel in monitoring status of computer network and identifying defective computers, workstations, and other components of network. Also assists in training network operators. Network for SNMAT located at Space Flight Operations Center (SFOC) at NASA's Jet Propulsion Laboratory. Intended to serve as data-reduction system providing windows, menus, and graphs, enabling users to focus on relevant information. SNMAT expected to be adaptable to other computer networks; for example in management of repair, maintenance, and security, or in administration of planning systems, billing systems, or archives.

  12. Pacific Educational Computer Network Study. Final Report.

    ERIC Educational Resources Information Center

    Hawaii Univ., Honolulu. ALOHA System.

    The Pacific Educational Computer Network Feasibility Study examined technical and non-technical aspects of the formation of an international Pacific Area computer network for higher education. The technical study covered the assessment of the feasibility of a packet-switched satellite and radio ground distribution network for data transmission…

  13. Integrated scientific computing in global networks

    Microsoft Academic Search

    Louis Perrochon; Rudolf Muller

    1998-01-01

    In network computing, methods (scripts, programs, models, macros, etc.) are executed at remote sites in a transparent way. Distributed method management systems (DMMSs) for network computing allow easy dissemination of new methods over global networks by supporting the publishing of new methods as well as finding and executing existing methods. For consumers, DMMSs replace awkward telnet sessions or debugging cycles

  14. Engineering Technology Programs Courses Guide for Computer Aided Design and Computer Aided Manufacturing.

    ERIC Educational Resources Information Center

    Georgia Univ., Athens. Div. of Vocational Education.

    This guide describes the requirements for courses in computer-aided design and computer-aided manufacturing (CAD/CAM) that are part of engineering technology programs conducted in vocational-technical schools in Georgia. The guide is organized in five sections. The first section provides a rationale for occupations in design and in production,…

  15. Role of Computer Assisted Instruction (CAI) in an Introductory Computer Concepts Course.

    ERIC Educational Resources Information Center

    Skudrna, Vincent J.

    1997-01-01

    Discusses the role of computer assisted instruction (CAI) in undergraduate education via a survey of related literature and specific applications. Describes an undergraduate computer concepts course and includes appendices of instructions, flowcharts, programs, sample student work in accounting, COBOL instructional model, decision logic in a…

  16. ECE 456: Computer Networks Pre-requisites

    E-print Network

    Schumacher, Russ

    (s) by distributed network nodes - Knows network programming techniques to implement distributed systems - Understand - Transport Protocols · TCP and UDP · Flow control, Congestion Control Network Programming · Socket systemECE 456: Computer Networks - - - Pre-requisites: - ECE 251;ECE 303/STAT 303; CS 160 or (CS 155; CS

  17. The effects of computer assisted instruction practices in computer office program course on academic achievements and attitudes toward computer

    Microsoft Academic Search

    Agah Tugrul Korucu; Semseddin Gunduz

    2011-01-01

    The purpose of this study is to reveal the effects of computer assisted instruction practices in computer office program course on academic achievements and attitudes toward computer among vocational high school students. This study was conducted on junior students in Beysehir Vocational High School in the spring term during 2009 and 2010 educational year. Two classes consisting of students with

  18. An Infrared Network for Mobile Computers

    Microsoft Academic Search

    Norman Adams; Bill N. Schilit; Michael M. Tso; Roy Want

    1993-01-01

    The PARCTAB infrared network provides a flexible infrastructure for research into wireless mobile computing. The network consists of a collection of room-sized cells each wired with a base station transceiver. Mobile computers communicate with transceivers through a carrier sense multiple access (CSMA) protocol and act as terminals for applications executing on remote hosts. Each mobile computer is represented by a

  19. Prediction and Assessment of Student Behaviour in Open and Distance Education in Computers Using Bayesian Networks

    ERIC Educational Resources Information Center

    Xenos, Michalis

    2004-01-01

    This paper presents a methodological approach based on Bayesian Networks for modelling the behaviour of the students of a bachelor course in computers in an Open University that deploys distance educational methods. It describes the structure of the model, its application for modelling the behaviour of student groups in the Informatics Course of…

  20. Ethereal: Getting Started CSCI 3171: Network Computing

    E-print Network

    Brooks, Stephen

    Ethereal: Getting Started CSCI 3171: Network Computing Introduction One's understanding of network," as shown in Figure 2.8 in the text. We will be using the Ethereal packet sniffer [http://www.ethereal

  1. Code 672 observational science branch computer networks

    NASA Technical Reports Server (NTRS)

    Hancock, D. W.; Shirk, H. G.

    1988-01-01

    In general, networking increases productivity due to the speed of transmission, easy access to remote computers, ability to share files, and increased availability of peripherals. Two different networks within the Observational Science Branch are described in detail.

  2. Pedagogical Utilization and Assessment of the Statistic Online Computational Resource in Introductory Probability and Statistics Courses

    PubMed Central

    Dinov, Ivo D.; Sanchez, Juana; Christou, Nicolas

    2009-01-01

    Technology-based instruction represents a new recent pedagogical paradigm that is rooted in the realization that new generations are much more comfortable with, and excited about, new technologies. The rapid technological advancement over the past decade has fueled an enormous demand for the integration of modern networking, informational and computational tools with classical pedagogical instruments. Consequently, teaching with technology typically involves utilizing a variety of IT and multimedia resources for online learning, course management, electronic course materials, and novel tools of communication, engagement, experimental, critical thinking and assessment. The NSF-funded Statistics Online Computational Resource (SOCR) provides a number of interactive tools for enhancing instruction in various undergraduate and graduate courses in probability and statistics. These resources include online instructional materials, statistical calculators, interactive graphical user interfaces, computational and simulation applets, tools for data analysis and visualization. The tools provided as part of SOCR include conceptual simulations and statistical computing interfaces, which are designed to bridge between the introductory and the more advanced computational and applied probability and statistics courses. In this manuscript, we describe our designs for utilizing SOCR technology in instruction in a recent study. In addition, present the results of the effectiveness of using SOCR tools at two different course intensity levels on three outcome measures: exam scores, student satisfaction and choice of technology to complete assignments. Learning styles assessment was completed at baseline. We have used three very different designs for three different undergraduate classes. Each course included a treatment group, using the SOCR resources, and a control group, using classical instruction techniques. Our findings include marginal effects of the SOCR treatment per individual classes; however, pooling the results across all courses and sections, SOCR effects on the treatment groups were exceptionally robust and significant. Coupling these findings with a clear decrease in the variance of the quantitative examination measures in the treatment groups indicates that employing technology, like SOCR, in a sound pedagogical and scientific manner enhances overall the students’ understanding and suggests better long-term knowledge retention. PMID:19750185

  3. Recent Advances inRecent Advances in Computer NetworkingComputer Networking

    E-print Network

    Jain, Raj

    1 Raj Jain Recent Advances inRecent Advances in Computer NetworkingComputer Networking includingResidential Broadband Raj Jain The Ohio State University Columbus, OH 43210 http://www.cis.ohio-state.edu/~jain/ New URL: http://www.cse.wustl.edu/~jain/ #12;3 Raj Jain ! Networking Trends ! ATM Networks ! Overview ! Legacy

  4. Modeling pesticide leaching from golf courses using artificial neural networks

    Microsoft Academic Search

    Steven K. Starrett; Shelli K. Starrett; Yacoub Najjar; Greg Adams; Judy Hill

    1998-01-01

    The objective of this work was to develop a computer model that accurately predicted pesticide leaching of pesticides applied to turfgrass areas. After much investigation, the number of inputs used to train the Artificial Neural Networks (ANN) was reduced to pesticide solubility, pesticide soikwater partitioning coefficient (Koc), time after application, and the irrigation application practice. For comparison reasons, 1st and

  5. The philosophy of artificial intelligence: a general studies course with particular benefits to computer science majors

    Microsoft Academic Search

    Paul A. Luker; Dennis Rothermel

    1994-01-01

    Over four years ago, we developed and implemented an upper division general studies course. “The Philosophy of Artificial Intelligence.” The course has since been team taught every semester by a computer scientist and a philosopher. Here, we draw on our four years' experience with the course to discuss its impact on computer science majors, for whom we feel that it

  6. Designing for Deeper Learning in a Blended Computer Science Course for Middle School Students

    ERIC Educational Resources Information Center

    Grover, Shuchi; Pea, Roy; Cooper, Stephen

    2015-01-01

    The focus of this research was to create and test an introductory computer science course for middle school. Titled "Foundations for Advancing Computational Thinking" (FACT), the course aims to prepare and motivate middle school learners for future engagement with algorithmic problem solving. FACT was also piloted as a seven-week course

  7. Network computing for computer science departments

    Microsoft Academic Search

    Norman R. Nielsen

    1970-01-01

    Computer science departments require a richness of computer support that is virtually unique among other academic disciplines. Not only is good computer service a necessity, but a variety of languages and modes of operation on a modern system are also required. In many cases these computing needs can be met through the use of a large computer system located on

  8. Multimedia computer support for a course in ground control

    SciTech Connect

    Summers, D.A.; Unal, A. [Univ. of Missouri, Rolla, MO (United States)

    1996-12-31

    A prototype multimedia compact disc (CD) was created using the facilities at the Rock Mechanics and Explosives Research Center (RMERC) of the University of Missouri-Rolla (UMR) to teach a portion of a course in Ground Control. Multimedia computers offer an environment where audio-visual presentations can be made in an interactive fashion. Together with relevant animation clips, video clips, and 3-D representations, the difficulties in describing mining processes and earth structures can be overcome. This paper describes the experience gained in preparing interactive multimedia lectures on computers. The hardware and software used in creating the sound commentary, 3-D graphics, animation clips, video clips, and movies are listed. The structure of the program and how interactivity was achieved is explained in detail. Such an instructional tool is not only an excellent supplement to regular courses but it also is an inexpensive and effective way of providing distance education for mining engineers working at remote locations scattered all over the country.

  9. Computing with Time: From Neural Networks to Sensor Networks

    Microsoft Academic Search

    Boleslaw K. Szymanski; Gilbert Chen

    2008-01-01

    This article advocates a new computing paradigm, called computing with time, that is capable of effi- ciently performing a certain class of computation, namely, searching in parallel for the closest value to the given parameter. It shares some features with the idea of computing with action potentials pro- posed by Hopfield, which originated in the field of artificial neuron networks.

  10. CIS 277 Introduction to Computer Graphics Techniques Course Number & Title (A.1) CIS 277 Introduction to Computer Graphics Techniques

    E-print Network

    Plotkin, Joshua B.

    CIS 277 Introduction to Computer Graphics Techniques Course Number & Title (A.1) CIS 277 Introduction to Computer Graphics Techniques Credit Units (A.2) 1 CU (3 hours of lecture per week) Instructor(s)/Required Materials (A.4) Interactive Computer Graphics, by Edward Angel, 5th Edition, Addison-Wesley, 2009. Course

  11. Computational Inference of Neural Information Flow Networks

    E-print Network

    Jarvis, Erich D.

    Computational Inference of Neural Information Flow Networks V. Anne Smith1[¤ , Jing Yu1,2[¤ , Tom V successful at inferring nonlinear neural information flow networks from electrophysiology data collected data incorrectly produces networks with information flow to non-neural tissue and over paths known

  12. Using E-Mail across Computer Networks.

    ERIC Educational Resources Information Center

    Hazari, Sunil

    1990-01-01

    Discusses the use of telecommunications technology to exchange electronic mail, files, and messages across different computer networks. Networks highlighted include ARPA Internet; BITNET; USENET; FidoNet; MCI Mail; and CompuServe. Examples of the successful use of networks in higher education are given. (Six references) (LRW)

  13. Computational Verification of Network Programs in Coq

    E-print Network

    Singh, Jaswinder Pal

    Computational Verification of Network Programs in Coq Gordon Stewart Princeton University Abstract of high-level network programs. The tool suite targets programs written in NetCore, a new declarative net of SDNs to build new high-level programming languages for networks, such as Net- tle [13], Frenetic [2

  14. Visualization techniques for computer network defense

    Microsoft Academic Search

    Justin M. Beaver; Chad A. Steed; Robert M. Patton; Xiaohui Cui; Matthew A Schultz

    2011-01-01

    Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the

  15. Why the network matters in cloud computing

    E-print Network

    Fisher, Kathleen

    this promise, and security concerns still loom AT&T NetBond AT&T network enabled cloud computing provides highly-secure access, with the cloud functioning just like another MPLS VPN site. It also allowsWhy the network matters in cloud computing The promise of cloud hinges on flexibility, agility

  16. Super-speed computer interfaces and networks

    SciTech Connect

    Tolmie, D.E.; St. John, W.; DuBois, D.H. [and others

    1997-10-01

    This is the final report of a one-year, Laboratory Directed Research and Development (LDRD) project at Los Alamos National Laboratory (LANL). Research into super-speed computer interfaces has been directed towards identifying networking requirements from compute-intensive applications that are crucial to DOE programs. In particular, both the DOE Energy Research High Performance Computing Research Centers (HPCRC) and the DOE Defense Programs Accelerated Strategic Computing Initiative (ASCI) have planned applications that will require large increases in network bandwidth. This project was set up to help network researchers identify those networking requirements and to plan the development of such networks. Based on studies, research, and LANL-sponsored workshops, this project helped forge the beginnings for multi-gigabit/sec network research and developments that today is being lead by Los Alamos in the American National Standards Institute (ANSI) 6.4 gigabit/sec specification called HIPPI-6400.

  17. Women Who Learn Computing Like Men: Different Gender Positions on Basic Computer Courses in Adult Education

    ERIC Educational Resources Information Center

    Salminen-Karlsson, Minna

    2009-01-01

    This article argues that research on gender and adult learning too often regards men and women as unified and separate groups, and does not take intra-gender variation into account. It presents one possible approach to address this problem, in a study of 142 women and 35 men attending basic computer courses in Swedish municipal adult education…

  18. CSCE 355: Foundations of Computation 1. Course number and name: CSCE 355: Foundations of Computation

    E-print Network

    Alekseyev, Max

    , grammars, automata, and Turing machines; fundamental limits of computation. b. Prerequisites: CSCE 211, 212 of instruction: 1. Prove theorems in discrete math by induction, contradiction, or cases 2. Analyze, design a Turing machine 7. Prove problems undecidable via reduction b. Relation of course outcomes to Student

  19. Computer network system for multiple processing elements

    SciTech Connect

    Collins, R.M.; Beauchemin, E.

    1989-05-30

    This patent describes a computer network system of processing elements comprising: (a) a first network bus for trasmitting/receiving information signals; (b) a first processing elements coupled to the first network bus for generating the information signals and wherein some of the information signals comprise computer instructions which may be transmitted simultaneously over the bus by each of two such processing elements during one time internal and which are to be executed by one of the first processing elements.

  20. Preliminary Experiences with a Tablet PC Based System to Support Active Learning in Computer Science Courses

    E-print Network

    Anderson, Richard

    on the benefits of active and collaborative learning and in its use in computer science courses. As classroom Science Courses Beth Simon Math & Computer Science Dept. University of San Diego San Diego, CA 92110 bsimon@sandiego.edu Ruth Anderson Computer Science Dept. University of Virginia Charlottesville, VA 22904

  1. Simulation for training computer network operations

    Microsoft Academic Search

    L. L. DeLooze; Paul McKean; John R. Mostow; Christopher Graig

    2004-01-01

    Attacks on Department of Defense computer systems are a serious and growing threat. The cornerstone to the protection of these highly valuable networks is education and training. The U. S. Strategic Command is examining a new tool to train and exercise computer security to determine if the complex concepts relating to computer security can be more effectively taught by including

  2. high-performance computing networked embedded systems

    E-print Network

    Kareem, Ahsan

    precise high-performance computing novel networked embedded systems integrated engineering business programming as easily as you could that of a computer. As important is that the mission of these little computers -- because that's what a microprocessor is, and embedded systems are made up of microprocessors

  3. Policies to Enhance Computer and Network Forensics

    Microsoft Academic Search

    Alec Yasinsac; Yanet Manzano

    2001-01-01

    The Internet is growing explosively, as is thenumber of crimes committed against or using computers. As aresponse to the growth of computer crime, the field of Computerand Network Forensics emerged. Computer forensics is the artof discovering and retrieving information about a crime in such away to make it admissible in court. It is after-the-fact in that theonly preventative capability of

  4. Virtual machines - an idea whose time has returned: application to network, security, and database courses

    Microsoft Academic Search

    William I. Bullers Jr.; Stephen Burd; Alessandro F. Seazzu

    2006-01-01

    Virtual machines provide a secure environment within which students may install, configure, and experiment with operating system, network, and database software. This paper describes experiences teaching three advanced courses in system and network administration, information security and assurance, and database administration using VMware workstation in a shared student laboratory. The paper describes benefits and challenges in course and lab configuration,

  5. Computer network environment planning and analysis

    NASA Technical Reports Server (NTRS)

    Dalphin, John F.

    1989-01-01

    The GSFC Computer Network Environment provides a broadband RF cable between campus buildings and ethernet spines in buildings for the interlinking of Local Area Networks (LANs). This system provides terminal and computer linkage among host and user systems thereby providing E-mail services, file exchange capability, and certain distributed computing opportunities. The Environment is designed to be transparent and supports multiple protocols. Networking at Goddard has a short history and has been under coordinated control of a Network Steering Committee for slightly more than two years; network growth has been rapid with more than 1500 nodes currently addressed and greater expansion expected. A new RF cable system with a different topology is being installed during summer 1989; consideration of a fiber optics system for the future will begin soon. Summmer study was directed toward Network Steering Committee operation and planning plus consideration of Center Network Environment analysis and modeling. Biweekly Steering Committee meetings were attended to learn the background of the network and the concerns of those managing it. Suggestions for historical data gathering have been made to support future planning and modeling. Data Systems Dynamic Simulator, a simulation package developed at NASA and maintained at GSFC was studied as a possible modeling tool for the network environment. A modeling concept based on a hierarchical model was hypothesized for further development. Such a model would allow input of newly updated parameters and would provide an estimation of the behavior of the network.

  6. Pixel Cinematography: A Lighting Approach for Computer Graphics (SIGGRAPH 96 - Course 30)

    NSDL National Science Digital Library

    A set of course notes that teaches aspects of cinematography for computer graphics. It includes topics on scene composition, camera placement and movement, and methods of lighting for creating computer graphics images and animations.

  7. Upper Level Engineering (ULE) Courses Electrical and Computer Engineering

    E-print Network

    Wong, Philip

    .326 Introduction to Optical Instrumentation (3) 520.401 Basic Communication (3) 520.410 Fiber Optics and Devices (3 Other Focus Area Courses (non-ULE) 110.405 Introduction to Real Analysis (4) 110.443 Fourier Analysis (4 Categories COURSE CATEGORIES Courses within the Imaging Focus Area are broadly categorized as: MEDICAL

  8. Linking Communication and Software Design Courses for Professional Development in Computer Science

    Microsoft Academic Search

    W. J. Williamson; Philip H. Sweany

    Linked communication and software design courses promote a more intensive and realistic learning environment for computer science stu- dents, especially when they work on real projects for real clients. Our students created web-based, educational software for middle-school math classes. We link communication and software design courses in an attempt to offer computer science students a useful and realistic professional development

  9. A Program of Computational Chemistry Exercises for the First-Semester General Chemistry Course

    ERIC Educational Resources Information Center

    Feller, Scott E.; Dallinger, Richard F.; McKinney, Paul Caylor

    2004-01-01

    The computer systems available for molecular modeling are described, along with a discussion of a molecular modeling program created and supported by computational techniques for the first-semester general chemistry course. Various exercises are listed, which direct the learner from a beginner's course in software practice to more complex…

  10. Design and Evaluation of a Computer Science and Engineering Course for Middle School Girls

    E-print Network

    Dourish,Paul

    Design and Evaluation of a Computer Science and Engineering Course for Middle School Girls Gabriela engagement and interest in STEM curricula, particularly among girls and underrepresented minorities [3 and tested a computing course for middle school girls, and this work resulted in three best practices: hands

  11. A Survey and Evaluation of Simulators Suitable for Teaching Courses in Computer Architecture and Organization

    ERIC Educational Resources Information Center

    Nikolic, B.; Radivojevic, Z.; Djordjevic, J.; Milutinovic, V.

    2009-01-01

    Courses in Computer Architecture and Organization are regularly included in Computer Engineering curricula. These courses are usually organized in such a way that students obtain not only a purely theoretical experience, but also a practical understanding of the topics lectured. This practical work is usually done in a laboratory using simulators…

  12. Happenstance and compromise: a gendered analysis of students' computing degree course selection

    Microsoft Academic Search

    Catherine Lang

    2010-01-01

    The number of students choosing to study computing at university continues to decline this century, with an even sharper decline in female students. This article presents the results of a series of interviews with university students studying computing courses in Australia that uncovered the influence of happenstance and compromise on course choice. This investigation provides an insight into the contributing

  13. A study to identify predictors of achievement in an introductory computer science course

    Microsoft Academic Search

    Sandra Katz; John M. Aronis; David Allbritton; Christine Wilson; Mary Lou Soffa

    2003-01-01

    In the study reported on here, 65 prospective computer or information science majors (47 male, 18 female) worked through a tutorial on the basics of Perl. All actions were recorded and time-stamped, allowing us to investigate the relationship between six factors that we believed would predict performance in an introductory computer science (CS) course (as measured by course grade) and

  14. THE DEVELOPMENT AND PRESENTATION OF FOUR COLLEGE COURSES BY COMPUTER TELEPROCESSING. FINAL REPORT.

    ERIC Educational Resources Information Center

    MITZEL, HAROLD E.

    THIS IS A FINAL REPORT ON THE DEVELOPMENT AND PRESENTATION OF FOUR COLLEGE COURSES BY COMPUTER TELEPROCESSING FROM APRIL 1964 TO JUNE 1967. IT OUTLINES THE PROGRESS MADE TOWARDS THE PREPARATION, DEVELOPMENT, AND EVALUATION OF MATERIALS FOR COMPUTER PRESENTATION OF COURSES IN AUDIOLOGY, MANAGEMENT ACCOUNTING, ENGINEERING ECONOMICS, AND MODERN…

  15. Information and Computing Recommendations for a Course at the Secondary School Level.

    ERIC Educational Resources Information Center

    Education and Computing, 1986

    1986-01-01

    Presents recommendations for an interdisciplinary course called "Computers, Information, and Related Technologies" developed for 9th and 10th grade students by the American Federation of Information Processing Societies (AFIPS). Main topics presented in the course include how information is processed, using information, and how computing and…

  16. Harvesting knowledge from computer mediated social networks

    Microsoft Academic Search

    Oluwafemi S. Ogunseye; Philip K. Adetiloye; Samuel O. Idowu; Olusegun Folorunso; Adio T. Akinwale

    2011-01-01

    Purpose – This paper aims to focus on how the advantages of computer mediated social networks (CMSN) can be effectively harnessed to create value for organizations in the form of ready knowledge and quick solutions to problems. Design\\/methodology\\/approach – A knowledge capture technique – the Delphi technique – was fused into the social networking process. A model was designed to

  17. The Computer Network with Intelligent Disks

    Microsoft Academic Search

    Zhou Yun-xia; Zhao Yue-long

    2010-01-01

    Almost no their own hard disks has been equipped for some network devices, so the data that followed will overwrite the former data when their memory is full, thus result in the data lose and resending the data. This paper introduces a workable way to solve this issue-Computer Network with Intelligent Disks. When mass data need to be accessed by

  18. Relative direction determination in mobile computing networks

    Microsoft Academic Search

    Antonis Kalis; Theodore AntonakopouloS

    2001-01-01

    A novel relative direction determination method is presented for stations of mobile computing networks. The method uses a switched beam array for determining the direction of arrival (DOA) of the incident electromagnetic field in a time efficient way, in order to confront the strict timing requirements of packet switching networks. Additionally, the method associates certain MAC layer functions with different

  19. Using IEEE 1394 network for cluster computing

    Microsoft Academic Search

    Yong Yu; Yu-Fai Fung

    2004-01-01

    The Network Of Workstations (NOWs). or Cluster. attract much otterition these years us a more cost- effectiie uption to implement pnrullel computing cumparing with supper computerv. NOWT is uften a collection of network backbone for home (7). A homo,qeneoii.s nodes interconnected by a high performance technolqqy L.7 a key factur which influences the overall cost- effectiveness uf the NOW The

  20. Integrated PVM Framework Supports Heterogeneous Network Computing

    E-print Network

    Dongarra, Jack

    when PVM is started. Applications can be written in Fortran 77 or C and parallelized by use of message tolerance of the network(s) and the processing elements. Typically, systems that operate on loosely coupled another attractive feature of loosely coupled computing environments is the potential for user­ level

  1. The LearningOnline Network with Computer-

    E-print Network

    system: #12;LON-CAPA 17 Middle: Resource Assembly Tool #12;LON-CAPA 18 LearningOnline Network WritesLON-CAPA 1 The LearningOnline Network with Computer- Assisted Personalized Approach (LON-CAPA) Gerd quality learning content in an online environment is time and cost intensive ·Typical scenario today

  2. Access to inter-organization computer networks

    Microsoft Academic Search

    Deborah Estrin

    1986-01-01

    When two or more organizations interconnect their internal computer networks they form an Inter-Organization Network (ION). This paper analyzes how this new medium changes the economics of inter-organization communication and interchange and can thereby support communications of greater intensity and scope. Furthermore, in the spirit of transaction cost theory [15], we analyze how the new communication patterns can in turn

  3. Quantization in Acquisition and Computation Networks

    E-print Network

    Goyal, Vivek K

    Quantization in Acquisition and Computation Networks by John Z. Sun B.S., Cornell University (2007 by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Professor Leslie A. Kolodziejski Chair, Committee on Graduate Students #12;2 #12;Quantization in Acquisition include sensor networks, wearable health-monitoring devices and a variety of other systems for infer- ence

  4. Theoretical and Computational Advances for Network Diversion

    E-print Network

    Theoretical and Computational Advances for Network Diversion Christopher A. Cullenbine Division and Business, Colorado School of Mines, Golden, Colorado 80401 The network-diversion problem (ND) is defined topology, (c) an improved mixed-integer programming formula- tion (MIP), and (d) useful valid inequalities

  5. Computational Optimization Methods The course covers typical computational optimization methods widely used in many

    E-print Network

    Cheng, Jianlin Jack

    application in deep learning networks Assignments There is one reading assignment for each topic. Students methods widely used in many computing domains, such as bioinformatics, data mining and machine learning programming and its applications in graph theory and sequence alignment 4. Linear programming, integer

  6. Computational Optimization Methods The course covers typical computational optimization methods widely used in many

    E-print Network

    Cheng, Jianlin Jack

    methods widely used in many computing domains, such as data mining, machine learning and bioinformatics in deep learning networks Assignments There is one reading assignment for each of some topics. Students-world applications in one or more domains. An active, problem-solving based teach and learning format will be applied

  7. Integrating emerging topics through online team design in a hybrid communication networks course: Interaction patterns and impact

    E-print Network

    Reisslein, Martin

    Integrating emerging topics through online team design in a hybrid communication networks course in the introductory communication networks course at Arizona State University, the authors have developed an online Abstract An important challenge in the introductory communication networks course in electrical

  8. Position paper on active countermeasures for computer networks.

    SciTech Connect

    Van Randwyk, Jamie A.

    2003-07-01

    Computer security professionals have used passive network countermeasures for several years in order to secure computer networks. Passive countermeasures such as firewalls and intrusion detection systems are effective but their use alone is not enough to protect a network. Active countermeasures offer new ways of protecting a computer network. Corporations and government entities should adopt active network countermeasures as a means of protecting their computer networks.

  9. Computer Modeling of Planetary Surface Temperatures in Introductory Astronomy Courses

    NASA Astrophysics Data System (ADS)

    Barker, Timothy; Goodman, J.

    2013-01-01

    Barker, T., and Goodman, J. C., Wheaton College, Norton, MA Computer modeling is an essential part of astronomical research, and so it is important that students be exposed to its powers and limitations in the first (and, perhaps, only) astronomy course they take in college. Building on the ideas of Walter Robinson (“Modeling Dynamic Systems,” Springer, 2002) we have found that STELLA software (ISEE Systems) allows introductory astronomy students to do sophisticated modeling by the end of two classes of instruction, with no previous experience in computer programming or calculus. STELLA’s graphical interface allows students to visualize systems in terms of “flows” in and out of “stocks,” avoiding the need to invoke differential equations. Linking flows and stocks allows feedback systems to be constructed. Students begin by building an easily understood system: a leaky bucket. This is a simple negative feedback system in which the volume in the bucket (a “stock”) depends on a fixed inflow rate and an outflow that increases in proportion to the volume in the bucket. Students explore how changing inflow rate and feedback parameters affect the steady-state volume and equilibration time of the system. This model is completed within a 50-minute class meeting. In the next class, students are given an analogous but more sophisticated problem: modeling a planetary surface temperature (“stock”) that depends on the “flow” of energy from the Sun, the planetary albedo, the outgoing flow of infrared radiation from the planet’s surface, and the infrared return from the atmosphere. Students then compare their STELLA model equilibrium temperatures to observed planetary temperatures, which agree with model ones for worlds without atmospheres, but give underestimates for planets with atmospheres, thus introducing students to the concept of greenhouse warming. We find that if we give the students part of this model at the start of a 50-minute class they are able to build the rest of the model and run planetary simulations by the end of class.

  10. Computing with Geometry as an Undergraduate Course: A Three-Year Experience

    E-print Network

    Shene, Ching-Kuang

    Computing with Geometry as an Undergraduate Course: A Three-Year Experience John L. Lowther­1295 {john,shene}@mtu.edu 1 Motivation Computing with geometry is a rapidly evolving interdis- ciplinary science curriculum, computing with geometry is virtually missing in spite of its impact on computer

  11. The Networked Computer Science Technical Report Library

    Microsoft Academic Search

    James R. Davis; Carl Lagoze

    1996-01-01

    The Networked Computer Science Technical Report Library (NCSTRL 1 ) is a distributed digital library of research results from computer science departments and laboratories in the USA and abroad. NCSTRL benefits readers, authors, and departments. Researchers throughout the world can use familiar Internet tools (the World Wide Web) to search for, browse, read, and download technical reports from participating institutions.

  12. How to Program Networked Portable Computers

    Microsoft Academic Search

    David Goldberg; Michael M. Tso

    1993-01-01

    What is the correct programming model for networked portable computers? Such computers come in many shapes and sizes, so it is unreasonable to expect that there is one programming model appropriate for every single variety. However, it is likely that there is some model that will work well for a wide range of cases. We propose the intelligently autonomous model

  13. Computation in gene networks Asa Ben-Hur

    E-print Network

    Siegelmann , Hava T

    computational devices. These in- clude quantum computation,1 DNA computation,2 neural networks,3 neuromorphic reactions can be used to implement Boolean logic and neural networks see Ref. 11 and references therein

  14. Spontaneous ad hoc mobile cloud computing network.

    PubMed

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peńalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

  15. Congestion avoidance in computer networks with a connectionless network layer

    Microsoft Academic Search

    R. Jain; D. M Ch

    1987-01-01

    Widespread use of computer networks and the use of varied technology for the interconnection of computers has made congestion a signi cant problem. In this report, we summarize our research on congestion avoidance. We compare the concept of congestion avoidance with that of congestion control. Brie y, congestion control is a recovery mechanism, while conges-tion avoidance is a prevention mechanism.

  16. Techniques of networking in the computer world.

    PubMed

    Armstrong, M L

    1985-09-01

    Networks can play an important role for nurses in user-to-user communication because they can be used both within and outside the health care delivery system. The choices include an information exchange, which can be an effective strategy for sharing personal concerns, problems, and achievements about the computer; commercial data bases with their vast sources of information and research data; or local area networks, effective in an office or campus setting. All of these networks can put worlds of information and services just a few words or keyboard strokes away, because they offer, outside of your own computer, a whole new dimension of retrieval, storage, reference, and communication capabilities. These networks can significantly enhance computing potential by providing an overall expansion of information. PMID:3903669

  17. CS 535 -Wireless Network Security This is a 3-credit course that focuses on security and privacy issues in wireless networks and

    E-print Network

    Levi, Albert

    CS 535 - Wireless Network Security Fall 2013 This is a 3-credit course that focuses on security and privacy issues in wireless networks and systems. Generally the security of MAC and especially upper layers information for this course (see below) several sub areas of wireless network security, in this course we

  18. Genetic Networks and Soft Computing

    Microsoft Academic Search

    Sushmita Mitra; Ranajit Das; Yoichi Hayashi

    2011-01-01

    The analysis of gene regulatory networks provides enormous information on various fundamental cellular processes involving growth, development, hormone secretion, and cellular communication. Their extraction from available gene expression profiles is a challenging problem. Such reverse engineering of genetic networks offers insight into cellular activity toward prediction of adverse effects of new drugs or possible identification of new drug targets. Tasks

  19. Advances in Computer Network Timekeeping NSF Division of Network and Computer Reserach Grant NCR9301002

    E-print Network

    Mills, David L.

    1 Advances in Computer Network Timekeeping NSF Division of Network and Computer Reserach Grant NCR and Infrastructure Grant NCR­93­01002, funded from June 1993. It is also a quartely project report for DARPA by contracts and grants from DARPA ITO, U.S. Naval Surface Weapons Center and U.S. Army Research Laboratories

  20. Towards a syllabus repository for computer science courses

    Microsoft Academic Search

    Manas Tungare; Xiaoyan Yu; William Cameron; Guofang Teng; Manuel A. Pérez-quińones; Lillian N. Cassel; Weiguo Fan; Edward A. Fox

    2007-01-01

    A syllabus defines the contents of a course, as well as other in- formation such as resources and assignments. In this paper, we report on our work towards creating a syllabus repository of Com- puter Science courses across universities in the USA. We present some statistics from our initial collection of 8000+ syllabi. We show a syllabus creator that is

  1. Incorporating PBL in a High School Computer Science Course

    Microsoft Academic Search

    Ling-Chian Chang; Greg C Lee

    2006-01-01

    The study was conducted with 605 high-school students in 13 classes of a typical high school in northern Taiwan. In the paper, we detail the past conduct of the course, the revised PBL-induced course design, and our experimental design. We discuss how we circumvented the usual challenges faced with PBL and some of the pragmatic issues faced during our implementation.

  2. Computational Tools for Teaching Graduate Courses in Geotechnical Engineering

    Microsoft Academic Search

    Teresa Santana; Pedro Lamas

    The Bologna Process assigns new challenges in higher education and in geotechnical engineering courses in particular. The ECTS (European Credit Transfer System), based on the student workload required to achieve the objectives of a program study, implies reduction of contact hours between teacher and student. In the graduate courses of Civil Engineering and Geological Engineering, at Faculdade de Cięncias e

  3. Roadmap: Technical and Applied Studies -Computer Technology Networking -Bachelor of Technical and Applied Studies

    E-print Network

    Khan, Javed I.

    Roadmap: Technical and Applied Studies - Computer Technology Networking - Bachelor of Technical and Applied Studies RE-BTAS-TAS-CTN Regional College Catalog year: 2014-2015 Page 1 of 2 | Last Updated: 28 Core Requirement 3 Applied Courses 2 3 Semester Two [16 Credits] ACTT, BMRT, COMT, INS or ITAP

  4. Development of an ECB on Computer Networks Based on WWW Technologies, Resources and Usability Criteria

    Microsoft Academic Search

    Pierluigi Crescenzi; Gaia Innocenti

    2002-01-01

    According to Baas, van den Eijnde, and Junger (2001) an electronic course book (ECB) is a learning module consisting of menu-driven hyperdocuments with a functional use of interactivity and multimedia, presented on the WWW and\\/or CDROM. The main purpose of this paper is to propose a model for the development of a computer network ECB based on (a) the integration

  5. Computer-Based Course of Laboratory Works in Molecular Physics

    Microsoft Academic Search

    A. M. Tolstik

    2001-01-01

    The use of computer simulation for teaching physics and problems and specific features of a computer-based laboratory practical work are discussed. A series of computer-based laboratory works in molecular physics developed by the author is detailed.

  6. Distributed deadlock detection in computer networks 

    E-print Network

    Reddy, M. Madhusudhan

    1991-01-01

    DISTRIBUTED DEADLOCI& DETECTION IN COMP UTER NETWORKS A Thesis by M. MADHUSUDHAN REDDY Submitted to the Offrce of Graduate Studies of Texas Alt M University in partial fulfillment of thc requirements for the degree of MASTER OF SCIENCE... August 1991 Major Subject, : Electrical Engineering DISTR113UTED DEADI. OCK DETECTION IN COMPUTER NETWORKS A Thesis by M. MADHUSUDHAN REDDY Approved as to style and content by: Hosame Abu Amara (Chair of Committee) Karan Watson (Member) ', Jy...

  7. Meteorological Monitoring And Warning Computer Network

    NASA Technical Reports Server (NTRS)

    Evans, Randolph J.; Dianic, Allan V.; Moore, Lien N.

    1996-01-01

    Meteorological monitoring system (MMS) computer network tracks weather conditions and issues warnings when weather hazards are about to occur. Receives data from such meteorological instruments as wind sensors on towers and lightning detectors, and compares data with weather restrictions specified for outdoor activities. If weather violates restriction, network generates audible and visible alarms to alert people involved in activity. Also displays weather and toxic diffusion data and disseminates weather forecasts, advisories, and warnings to workstations.

  8. Research on Application Data Mining to Teaching of Basic Computer Courses in Universities

    Microsoft Academic Search

    Ye Zhiwei; Hu Zhengbing; Chen Hongwei; Liu Wei

    2010-01-01

    With the rapid development of information technology, computer technology has been getting more widely used in daily life, thus, it is necessary for each university graduates grasp basic technical skills of computers. However, usually a teacher will be responsible for teaching many college students basic computer courses, so it is difficult to ensure the quality of the teaching with the

  9. Comparative Study of Various Computer Tools in Electrical Engineering Courses1

    E-print Network

    Cańizares, Claudio A.

    Comparative Study of Various Computer Tools in Electrical Engineering Courses1 Claudio A. Ca~nizares and Zeno T. Faur University of Waterloo Department of Electrical & Computer Engineering Waterloo, ON #12;Abstract This report discusses di erent computer tools used to help deliver, administerand teach

  10. Talking about Code: Integrating Pedagogical Code Reviews into Early Computing Courses

    ERIC Educational Resources Information Center

    Hundhausen, Christopher D.; Agrawal, Anukrati; Agarwal, Pawan

    2013-01-01

    Given the increasing importance of soft skills in the computing profession, there is good reason to provide students withmore opportunities to learn and practice those skills in undergraduate computing courses. Toward that end, we have developed an active learning approach for computing education called the "Pedagogical Code Review"…

  11. On computer vision in wireless sensor networks.

    SciTech Connect

    Berry, Nina M.; Ko, Teresa H.

    2004-09-01

    Wireless sensor networks allow detailed sensing of otherwise unknown and inaccessible environments. While it would be beneficial to include cameras in a wireless sensor network because images are so rich in information, the power cost of transmitting an image across the wireless network can dramatically shorten the lifespan of the sensor nodes. This paper describe a new paradigm for the incorporation of imaging into wireless networks. Rather than focusing on transmitting images across the network, we show how an image can be processed locally for key features using simple detectors. Contrasted with traditional event detection systems that trigger an image capture, this enables a new class of sensors which uses a low power imaging sensor to detect a variety of visual cues. Sharing these features among relevant nodes cues specific actions to better provide information about the environment. We report on various existing techniques developed for traditional computer vision research which can aid in this work.

  12. Computational Statistical Methods for Social Network Models

    PubMed Central

    Hunter, David R.; Krivitsky, Pavel N.; Schweinberger, Michael

    2013-01-01

    We review the broad range of recent statistical work in social network models, with emphasis on computational aspects of these methods. Particular focus is applied to exponential-family random graph models (ERGM) and latent variable models for data on complete networks observed at a single time point, though we also briefly review many methods for incompletely observed networks and networks observed at multiple time points. Although we mention far more modeling techniques than we can possibly cover in depth, we provide numerous citations to current literature. We illustrate several of the methods on a small, well-known network dataset, Sampson’s monks, providing code where possible so that these analyses may be duplicated. PMID:23828720

  13. Organizational Alternatives for a Pacific Educational Computer-Communications Network.

    ERIC Educational Resources Information Center

    Ah Mai, Karen L.

    Organizational alternatives for a Pacific educational computer-communications network are studied through the examples provided by other networks. A survey of networks is provided with a discussion of the history and development of networks and the distinctions in network technology and applications. Nine specific networks are described. Libraries…

  14. Student Computer Use in Selected Undergraduate Agriculture Courses: An Examination of Required Tasks.

    ERIC Educational Resources Information Center

    Johnson, Donald M.; Ferguson, James A.; Vokins, Nancy W.; Lester, Melissa L.

    2000-01-01

    Over 50% of faculty teaching undergraduate agriculture courses (n=58) required use of word processing, Internet, and electronic mail; less than 50% required spreadsheets, databases, graphics, or specialized software. They planned to maintain or increase required computer tasks in their courses. (SK)

  15. Structure and content of service courses in computer science for other disciplines

    Microsoft Academic Search

    Alton R. Goddard

    1973-01-01

    The purpose of this paper is to discuss some of the problems with, hopefully, some suggestions or lessons learned from past experiences to provide guidelines for workable solutions to these problems. Some universities, including the one where I am presently employed, permit graduate students in doctoral programs to take two courses in statistics and two courses in Computer Science in

  16. Learning strategies sessions within the classroom in computing science university courses

    Microsoft Academic Search

    Diana Cukierman; Donna McGee Thompson

    2007-01-01

    This abstract describes a research project being conducted at a Canadian university in core first year undergraduate Computing Science courses. We are investigating the impact of integrating learning strategies instruction within the regular lab time of these courses to aid students' learning. Our concern, shared by educators and academic advisors, is that some students entering post secondary studies are unfamiliar

  17. An instructional approach to drive computer science courses through virtual learning environments

    Microsoft Academic Search

    Félix Buendía; Juan Carlos Cano; José Vicente Benlloch

    2009-01-01

    Nowadays, many universities have adopted Virtual Learning Environments for delivering and distributing educational resources. In the context of Computer Science (CS) courses, the use of these environments addresses several issues ranging from the application of instructional strategies to the selection of the most adequate learning platform. In this work, we propose an instructional approach to drive CS courses through virtual

  18. Toward a Singleton Undergraduate Computer Graphics Course in Small and Medium-Sized Colleges

    ERIC Educational Resources Information Center

    Shesh, Amit

    2013-01-01

    This article discusses the evolution of a single undergraduate computer graphics course over five semesters, driven by a primary question: if one could offer only one undergraduate course in graphics, what would it include? This constraint is relevant to many small and medium-sized colleges that lack resources, adequate expertise, and enrollment…

  19. Computational Study of Non-linear Great Deluge for University Course Timetabling

    E-print Network

    Landa-Silva, Dario

    Computational Study of Non-linear Great Deluge for University Course Timetabling Joe Henry Obit-linear great deluge algorithm to difficult instances of the university course timetabling problem. The results algorithm is a meta-heuristic approach proposed by Dueck [12] and is inspired by the behaviour that could

  20. Teaching College Computer Courses in Saudi Arabia (Issues Concerning the Classroom and the Culture).

    ERIC Educational Resources Information Center

    Rebhun, Herbert F.

    This report provides information concerning one teacher's experience in teaching college courses for Arkansas State University in the area of computer information systems to Saudi Arabian men employed by the Saudi Arabian Customs Automation Department. The students had spent approximately 2 years in Arkansas taking courses, and then went back to…

  1. A major problem in teaching com-puter architecture and organization courses is

    E-print Network

    Milenkovi, Aleksandar

    students make the cognitive leap that connects their theoretical knowledge with practical experience. First, it must cover an extensive range of com- puter architecture and organization topics. Second. The first course, a second-year undergraduate course, covers basic computer structure concepts, including

  2. Educational Impact of Digital Visualization Tools on Digital Character Production Computer Science Courses

    ERIC Educational Resources Information Center

    van Langeveld, Mark Christensen

    2009-01-01

    Digital character production courses have traditionally been taught in art departments. The digital character production course at the University of Utah is centered, drawing uniformly from art and engineering disciplines. Its design has evolved to include a synergy of computer science, functional art and human anatomy. It gives students an…

  3. Copyright is held by the author/owner. RUNNING A COMPUTER SECURITY COURSE

    E-print Network

    Riabov, Vladimir V.

    including cryptography, protocols, standards, and security implementation. An important part of the courses A COMPUTER SECURITY COURSE: CHALLENGES, TOOLS, AND PROJECTS* POSTER SESSION Vladimir V. Riabov and Bryan J security classes (security tools, technology overviews, research projects, virtual labs, and Web resources

  4. Portraits of PBL: Course Objectives and Students' Study Strategies in Computer Engineering, Psychology and Physiotherapy.

    ERIC Educational Resources Information Center

    Dahlgren, Madeleine Abrandt

    2000-01-01

    Compares the role of course objectives in relation to students' study strategies in problem-based learning (PBL). Results comprise data from three PBL programs at Linkopings University (Sweden), in physiotherapy, psychology, and computer engineering. Faculty provided course objectives to function as supportive structures and guides for students'…

  5. Impact of Computer Software on Advertising Media Courses: A Study of 71 Colleges and Universities.

    ERIC Educational Resources Information Center

    Martin, Dennis G.; Vaccaro-Lloyd, Carla

    A study evaluated the impact of microcomputers and software in advertising media courses by surveying media planning instructors in 71 (out of 111) colleges and universities. The survey asked instructors to evaluate textbooks, workbooks, and computer software; to assess the impact of software on the media course; and to compare software users with…

  6. The Development and Presentation of Four Different College Courses by Computer Teleprocessing. Interim Report.

    ERIC Educational Resources Information Center

    Mitzel, Harold E.; Wodtke, Kenneth H.

    A computer-assisted instruction (CAI) project undertaken in 1965 sought to: 1) teach college instructors to prepare quality CAI curricula; 2) ascertain student attitudes toward CAI; 3) compare CAI with the lecture method; and 4) demonstrate prototypical CAI courses. Teachers were successfully trained in the use of Coursewriter and prepared courses

  7. Chapter 2 Using Networks A network is for sharing information using computers. Each computer is important, but sharing information

    E-print Network

    Kasahara, Hironori

    . Moreover, networking also allows multiple computers to share expensive equipment like printers. As we have33 Chapter 2 Using Networks A network is for sharing information using computers. Each computer is important, but sharing information over inter-connected computers has a different value. In order to use

  8. CSC258 Computer Organization 2011 Fall St.George Course Outline

    E-print Network

    Hehner, Eric C.R.

    and digital, semiconductors, diodes, transistors, logic gates, integrated circuits Binary (Boolean) AlgebraCSC258 Computer Organization 2011 Fall St.George Course Outline Circuit Technology analog notations, unified algebra, laws, simplification binary expressions, value (truth) tables, circuit diagrams

  9. Contributing to success in an introductory computer science course: a study of twelve factors

    Microsoft Academic Search

    Brenda Cantwell Wilson; Sharon Shrock

    2001-01-01

    This study was conducted to determine factors that promote success in an introductory college computer science course. The model included twelve possible predictive factors including math background, attribution for success\\/failure (luck, effort, difficulty of task, and ability), domain specific self-efficacy, encouragement, comfort level in the course, work style preference, previous programming experience, previous non-programming computer experience, and gender. Subjects included

  10. The impact of gender-differentiated golf course features on women's networking

    Microsoft Academic Search

    Michelle M. Arthur; Robert G. Del Campo; Harry J. van Buren III

    2011-01-01

    Purpose – The purpose of this paper is to consider whether golf functions as a networking barrier for women in professions that require networking for career success. Design\\/methodology\\/approach – Data from 496 golf courses, in addition to demographic data and data about salaries in sales, managerial, and marketing and sales professions in the USA, were used to assess if differences

  11. LAN Configuration and Analysis: Projects for the Data Communications and Networking Course

    ERIC Educational Resources Information Center

    Chen, Fang; Brabston, Mary

    2011-01-01

    We implemented two local area network (LAN) projects in our introductory data communications and networking course. The first project required students to develop a LAN from scratch for a small imaginary organization. The second project required student groups to analyze a LAN for a real world small organization. By allowing students to apply what…

  12. Multiple network alignment on quantum computers

    NASA Astrophysics Data System (ADS)

    Daskin, Anmer; Grama, Ananth; Kais, Sabre

    2014-12-01

    Comparative analyses of graph-structured datasets underly diverse problems. Examples of these problems include identification of conserved functional components (biochemical interactions) across species, structural similarity of large biomolecules, and recurring patterns of interactions in social networks. A large class of such analyses methods quantify the topological similarity of nodes across networks. The resulting correspondence of nodes across networks, also called node alignment, can be used to identify invariant subgraphs across the input graphs. Given graphs as input, alignment algorithms use topological information to assign a similarity score to each -tuple of nodes, with elements (nodes) drawn from each of the input graphs. Nodes are considered similar if their neighbors are also similar. An alternate, equivalent view of these network alignment algorithms is to consider the Kronecker product of the input graphs and to identify high-ranked nodes in the Kronecker product graph. Conventional methods such as PageRank and HITS (Hypertext-Induced Topic Selection) can be used for this purpose. These methods typically require computation of the principal eigenvector of a suitably modified Kronecker product matrix of the input graphs. We adopt this alternate view of the problem to address the problem of multiple network alignment. Using the phase estimation algorithm, we show that the multiple network alignment problem can be efficiently solved on quantum computers. We characterize the accuracy and performance of our method and show that it can deliver exponential speedups over conventional (non-quantum) methods.

  13. Network based high performance concurrent computing

    SciTech Connect

    Sunderam, V.S.

    1991-01-01

    The overall objectives of this project are to investigate research issues pertaining to programming tools and efficiency issues in network based concurrent computing systems. The basis for these efforts is the PVM project that evolved during my visits to Oak Ridge Laboratories under the DOE Faculty Research Participation program; I continue to collaborate with researchers at Oak Ridge on some portions of the project.

  14. Neural networks in computational science and engineering

    Microsoft Academic Search

    G. Cybenko

    1996-01-01

    An artificial neural network (ANN) is a computational system inspired by the structure, processing method and learning ability of a biological brain. In a commonly accepted model of the brain, a given neuron receives electrochemical input signals from many neurons through synapses-some inhibitory, some excitatory-at its receiving branches, or dendrites. If and when the net sum of the signals reaches

  15. Improved algorithms for synchronizing computer network clocks

    Microsoft Academic Search

    David L. Mills

    1994-01-01

    The Network Time Protocol (NTP) is widely deployed in the Internet to synchronize computer clocks to each other and to international standards via telephone modem, radio and satellite. The protocols and algorithms have evolved over more than a decade to produce the present NTP Version 3 specification and implementations. Most of the estimated deployment of 100,000 NTP servers and clients

  16. Improved Algorithms for Synchronizing Computer Network Clocks

    Microsoft Academic Search

    David L. Mills

    1994-01-01

    The Network Time Protocol (NTP) is widely deployed in the Internet to synchronize computer clocks to each other and to international standards via telephone modem, radio and satellite. The protocols and algorithms have evolved over more than a decade to produce the present NTP Version 3 specification and implementa- tions. Most of the estimated deployment of 100,000 NTP servers and

  17. Requirement emergence computation of networked software

    Microsoft Academic Search

    Keqing He; Liang Peng; Rong Peng; Bing Li; Jing Liu

    2007-01-01

    Abstract, Emergence ,Computation ,has become ,a hot topic in the research of complex systems in recent years. With the substantial increase in scale ,and complexity ,of network-based information systems, the uncertain user re- quirements from the Internet and personalized application requirement result in the frequent change for the software requirement. Meanwhile, the software system with non self-possessed resource become ,more

  18. Supporting Heterogeneous Network Computing: Jack J. Dongarra

    E-print Network

    Dongarra, Jack

    is started. Applications can be written in Fortran 77 or C and parallelized by use of message elements. Typically, systems that operate on loosely coupled networks permit the direct use of editors coupled computing environments is the potential for user- level or program-level fault tolerance that can

  19. Integrated PVM Framework Supports Heterogeneous Network Computing

    E-print Network

    Dongarra, Jack

    PVM is started. Applications can be written in Fortran 77 or C and parallelized by use of message. Typically, systems that operate on loosely coupled networks permit the direct use of editors, compilers implementations of the application. Yet another attractive feature of loosely coupled computing environments

  20. Dynamicity Issues in Broadband Network Computing

    Microsoft Academic Search

    Steven Gutfreund; José P. Diaz-gonzalez; Russell Sasnett; Vincent Phuah

    1991-01-01

    A compound multi-media document consists of a mix of continuous media elements (audio, video, instrument sensors, etc.) and computational elements that display, chart, record, and process the media elements. In a network environment, where these elements exist at different locations on the communication fabric, there are obvious synchronization problems. However, there is also a class of problems we call dynamicity

  1. Mobile and Ubiquitous Computing Wireless Sensor Networks

    E-print Network

    Roussos, George

    1 Mobile and Ubiquitous Computing Wireless Sensor Networks George Roussos g Sensor, Test4, Increasing frequency Time (sec) Acceleration(g) Why "Real" Information is so Important Information ShoppingShopping ScienceScience SportsSports 6 WeatherWeather TechnologyTechnology Financial

  2. Advanced networks and computing in healthcare

    PubMed Central

    Ackerman, Michael

    2011-01-01

    As computing and network capabilities continue to rise, it becomes increasingly important to understand the varied applications for using them to provide healthcare. The objective of this review is to identify key characteristics and attributes of healthcare applications involving the use of advanced computing and communication technologies, drawing upon 45 research and development projects in telemedicine and other aspects of healthcare funded by the National Library of Medicine over the past 12?years. Only projects publishing in the professional literature were included in the review. Four projects did not publish beyond their final reports. In addition, the authors drew on their first-hand experience as project officers, reviewers and monitors of the work. Major themes in the corpus of work were identified, characterizing key attributes of advanced computing and network applications in healthcare. Advanced computing and network applications are relevant to a range of healthcare settings and specialties, but they are most appropriate for solving a narrower range of problems in each. Healthcare projects undertaken primarily to explore potential have also demonstrated effectiveness and depend on the quality of network service as much as bandwidth. Many applications are enabling, making it possible to provide service or conduct research that previously was not possible or to achieve outcomes in addition to those for which projects were undertaken. Most notable are advances in imaging and visualization, collaboration and sense of presence, and mobility in communication and information-resource use. PMID:21486877

  3. A programming course in bioinformatics for computer and information science students.

    PubMed

    Altman, R B; Koza, J

    1996-01-01

    We have created a course entitled "Representations and Algorithms for Computational Molecular Biology" with three specific goals in mind. First, we want to provide a technical introduction for computer science and medical information science students to the challenges of computing with molecular biology data, particularly the advantages of having easy access to real-world data sets. Second, we want to equip the students with the skills required of productive research assistants in molecular biology computing research projects. Finally, we want to provide a showcase for local investigators to describe their work in the context of a course that provide adequate background information. In order to achieve these goals, we have created a programming course, in which three major projects and six smaller assignments are assigned during the quarter. We stress fundamental representations and algorithms during the first part of the course in lectures given by the core faculty, and then have more focused lectures in which faculty research interests are highlighted. The course stressed issues of structural molecular biology, in order to better motivate the critical issues in sequence analysis. The culmination of the course was a challenge to the students to use a version of protein threading to predict which members of a set of unknown sequences were globins. The course was well received, and has been made a core requirement in the Medical Information Sciences program. PMID:9390224

  4. Assessing computer network security with fuzzy analytic hierarchy process

    Microsoft Academic Search

    Jun Fei; Huan Xu

    2010-01-01

    The hierarchy model of computer network security assessment was constructed in the light of the characteristics of computer network and the factors influencing the network security. The fuzzy analytic hierarchy process based on triangular fuzzy numbers was applied to assess the network security quantitatively. Final results of the example indicate that the fuzzy analytic hierarchy process is an exploratory method

  5. An Investigation of Student Practices in Asynchronous Computer Conferencing Courses

    ERIC Educational Resources Information Center

    Peters, Vanessa L.; Hewitt, Jim

    2010-01-01

    This study investigated the online practices of students enrolled in graduate-level distance education courses. Using interviews and a questionnaire as data sources, the study sought to: (a) identify common practices that students adopt in asynchronous discussions, and (b) gain an understanding of why students adopt them. An analysis of the data…

  6. Page 280 Courses: Computer and Engineering Science (CES) Sonoma State University 2011-2012 Catalog Computer and Engineering Science (CES)

    E-print Network

    Ravikumar, B.

    Computer and Engineering Science (CES) CeS 400 lineAr SySteMS theOry (3) Lecture, 3 hours. Analysis science majors. Coursework will be organized around large programming projects. The contentPage 280 Courses: Computer and Engineering Science (CES) Sonoma State University 2011-2012 Catalog

  7. Courses: Computer and Engineering Science (CES) Page 281Sonoma State University 2012-2013 Catalog Computer and Engineering Science (CES)

    E-print Network

    Ravikumar, B.

    Computer and Engineering Science (CES) CES 400 LinEar SyStEmS thEory (3) Lecture, 3 hours. AnalysisCourses: Computer and Engineering Science (CES) Page 281Sonoma State University 2012-2013 Catalog of linear time-invariant systems, correlation, convolu- tion, impulse response, complex variables, Fourier

  8. Social Studies: Application Units. Course II, Teachers. Computer-Oriented Curriculum. REACT (Relevant Educational Applications of Computer Technology).

    ERIC Educational Resources Information Center

    Tecnica Education Corp., San Carlos, CA.

    This book is one of a series in Course II of the Relevant Educational Applications of Computer Technology (REACT) Project. It is designed to point out to teachers two of the major applications of computers in the social sciences: simulation and data analysis. The first section contains a variety of simulation units organized under the following…

  9. Accelerating commutation circuits in quantum computer networks

    NASA Astrophysics Data System (ADS)

    Jiang, Min; Huang, Xu; Chen, Xiaoping; Zhang, Zeng-ke

    2012-12-01

    In a high speed and packet-switched quantum computer network, a packet routing delay often leads to traffic jams, becoming a severe bottleneck for speeding up the transmission rate. Based on the delayed commutation circuit proposed in Phys. Rev. Lett. 97, 110502 (2006), we present an improved scheme for accelerating network transmission. For two more realistic scenarios, we utilize the characteristic of a quantum state to simultaneously implement a data switch and transmission that makes it possible to reduce the packet delay and route a qubit packet even before its address is determined. This circuit is further extended to the quantum network for the transmission of the unknown quantum information. The analysis demonstrates that quantum communication technology can considerably reduce the processing delay time and build faster and more efficient packet-switched networks.

  10. Advanced Scientific Computing Research Network Requirements

    SciTech Connect

    Bacon, Charles; Bell, Greg; Canon, Shane; Dart, Eli; Dattoria, Vince; Goodwin, Dave; Lee, Jason; Hicks, Susan; Holohan, Ed; Klasky, Scott; Lauzon, Carolyn; Rogers, Jim; Shipman, Galen; Skinner, David; Tierney, Brian

    2013-03-08

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the U.S. Department of Energy (DOE) Office of Science (SC), the single largest supporter of basic research in the physical sciences in the United States. In support of SC programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 25 years. In October 2012, ESnet and the Office of Advanced Scientific Computing Research (ASCR) of the DOE SC organized a review to characterize the networking requirements of the programs funded by the ASCR program office. The requirements identified at the review are summarized in the Findings section, and are described in more detail in the body of the report.

  11. [Renewal of NIHS computer network system].

    PubMed

    Segawa, Katsunori; Nakano, Tatsuya; Saito, Yoshiro

    2012-01-01

    Updated version of National Institute of Health Sciences Computer Network System (NIHS-NET) is described. In order to reduce its electric power consumption, the main server system was newly built using the virtual machine technology. The service that each machine provided in the previous network system should be maintained as much as possible. Thus, the individual server was constructed for each service, because a virtual server often show decrement in its performance as compared with a physical server. As a result, though the number of virtual servers was increased and the network communication became complicated among the servers, the conventional service was able to be maintained, and security level was able to be rather improved, along with saving electrical powers. The updated NIHS-NET bears multiple security countermeasures. To maximal use of these measures, awareness for the network security by all users is expected. PMID:23243992

  12. Causal Attributions of Success and Failure Made by Undergraduate Students in an Introductory-Level Computer Programming Course

    ERIC Educational Resources Information Center

    Hawi, N.

    2010-01-01

    The purpose of this research is to identify the causal attributions of business computing students in an introductory computer programming course, in the computer science department at Notre Dame University, Louaize. Forty-five male and female undergraduates who completed the computer programming course that extended for a 13-week semester…

  13. Computer Networks in K-12 Education Jon M. Peha

    E-print Network

    Peha, Jon M.

    Computer Networks in K-12 Education Jon M. Peha Carnegie Mellon University peha@cmu.edu, www are Using Computer Networks," Educational Leadership: Journal of the Association for Supervision Computer networks have already revolutionized many of the institutions and endeavors that involve

  14. The Computational Power of Interactive Recur-rent Neural Networks

    E-print Network

    Siegelmann , Hava T

    1 The Computational Power of Interactive Recur- rent Neural Networks J´er´emie Cabessa1 and Hava T, interactive computation, analog computation, re- current neural networks, interactive Turing machines-weighted recurrent neural networks were shown to be respectively equivalent to and strictly more powerful than

  15. Computer and Network Systems (CNS): Core Programs PROGRAM SOLICITATION

    E-print Network

    Collins, Gary S.

    Computer and Network Systems (CNS): Core Programs PROGRAM SOLICITATION NSF 13-581 REPLACES DOCUMENT General Information Program Title: Computer and Network Systems (CNS): Core Programs Synopsis of Program that develop new knowledge in two core programs: Computer Systems Research (CSR) program; and Networking

  16. Computability in Anonymous Networks: Revocable vs. Irrecovable Outputs

    E-print Network

    Computability in Anonymous Networks: Revocable vs. Irrecovable Outputs Yuval Emek1 , Jochen Seidel2. What can be computed in an anonymous network, where nodes are not equipped with unique identifiers computed output value: Two classes of problems solvable in anonymous networks are defined, where

  17. THE CASE FOR TEACHING NETWORK PROTOCOLS TO COMPUTER FORENSICS EXAMINERS

    Microsoft Academic Search

    Gary C. Kessler; Matt Fasulo

    Most computer forensics experts are well-versed in basic computer hardware technology, operating systems, common software applications, and computer forensics tools. And while many have rudimentary knowledge about the Internet and simple network-lookup tools, they are not trained in the analysis of network communication protocols and the use of packet sniffers. This paper describes digital forensics applications for network analysis and

  18. Piping network model program for small computers

    SciTech Connect

    Kruckenberg, N.E.

    1986-07-01

    A model of fluid piping networks was developed to aid in solving problems in the recirculating water coolant system at the Portsmouth Gaseous Diffusion Plant. The piping network model can be used to solve steady state problems in which water flow rates and temperatures are to be determined, or in which temperature is an important factor in determining pressure losses. The model can be implemented on desktop computers to perform these calculations as needed to track changing process conditions. The report includes a description of the coolant system, the mathematical development f the computer model, a case study utilizing the model and a listing and sample run of the computer codes. 2 figs., 1 tab.

  19. Improving Computing Courses from the Points of View of Students and Teachers: A Review and an Empirical Study

    ERIC Educational Resources Information Center

    Sampaio, Alberto; Sampaio, Isabel

    2012-01-01

    The improvement of computing courses is a permanent need and is a goal established by any teacher. Suggestions of possible course improvements should be made by teachers and students. Computer project-based courses involving a significant number of people pose difficulties to listening to all their opinions. The purpose of our research is twofold:…

  20. Network virtualization for cloud computing

    Microsoft Academic Search

    Fabio Baroncelli; Barbara Martini; Piero Castoldi

    2010-01-01

    Cloud computing enables a transparent access to information technology (IT) services such that the users do not need to know\\u000a the location and characteristics of the relevant resources. While IT resource virtualization and service abstraction have\\u000a been widely investigated, data transport within the cloud and its efficient control have not received much attention in the\\u000a technical literature. In fact, connectivity

  1. Knowledge Based Descriptive Neural Networks Department of Computer Science,

    E-print Network

    Yao, JingTao

    Knowledge Based Descriptive Neural Networks J. T. Yao Department of Computer Science, University a study of knowledge based descriptive neural networks (DNN). DNN is a neural network that incorporates rules extracted from trained neural networks. One of the major drawbacks of neural network models

  2. Anonymous Transactions in Computer Networks

    NASA Astrophysics Data System (ADS)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  3. Student-oriented examination in a computer architecture course

    Microsoft Academic Search

    Erik Larsson; Anders Larsson

    2004-01-01

    Learning is a highly individual process.Some prefer learning by reading the course material, others learn best by listening to a lecture, while some like to learn in a trial-and-error way by themselves in a laboratory assignment. A good learning scheme is individual. A scheme that is good for some persons might not at all be good scheme for someone else.

  4. An introductory course in the applications of computer technology in the health sciences

    Microsoft Academic Search

    G. Bordage; Robin B. Lake

    1976-01-01

    This paper discusses the contents of an introductory course in the applications of computer technology in the health sciences. A set of instructional goals is described, designed to meet the basic needs of the health professional involved in understanding and developing computer-based applications in his environment. From these goals, a list of specific objectives is constructed and presented as the

  5. Towards Student Instrumentation of Computer-Based Algebra Systems in University Courses

    ERIC Educational Resources Information Center

    Stewart, Sepideh; Thomas, Michael O. J.; Hannah, John

    2005-01-01

    There are many perceived benefits of using technology, such as computer algebra systems, in undergraduate mathematics courses. However, attaining these benefits sometimes proves elusive. Some of the key variables are the teaching approach and the student instrumentation of the technology. This paper considers the instrumentation of computer-based…

  6. Ingredients for student-centered learning in undergraduate computing science courses

    Microsoft Academic Search

    Philippe J. Giabbanelli

    2012-01-01

    Previous researchers and educators have highlighted the potential for making computing science courses creative and fun. This can be a challenging exercise as it can be demanding in terms of resources and may lead to settings which are more entertaining than informative. In this paper, we share our experiences in introducing three ingredients to address this challenge in undergraduate computing

  7. Recursive algorithms in computer science courses: Fibonacci numbers and binomial coefficients

    Microsoft Academic Search

    I. Stojmenovic; Binomial Coefficients

    2000-01-01

    We observe that the computational inefficiency of branched recursive functions was not appropriately covered in almost all textbooks for computer science courses in the first three years of the curriculum. Fibonacci numbers and binomial coefficients were frequently used as examples of branched recursive functions. However, their exponential time complexity was rarely claimed and never completely proved in the textbooks. Alternative

  8. Landuse: A Computer Program for Laboratory Use in Economic Geography Courses, Technical Paper No. 8.

    ERIC Educational Resources Information Center

    Marble, Duane F.; Anderson, Bruce M.

    This technical report describes a digital computer program on the spatial structure of agricultural production and how it can be used in economic geography courses. Chapters one through four, respectively, (1) examine the use of digital computers in the teaching of college geography, (2) analyze the von Thunen theory which postulates laws that…

  9. Advantages and disadvantages of using various computer tools in electrical engineering courses

    Microsoft Academic Search

    C. A. Canizares; Zeno T. Faur

    1997-01-01

    This paper discusses different computer tools used to help deliver, administer, and teach the material covered in two basic undergraduate courses in electrical engineering. The computer facilities, programs and tutorials developed are discussed; however, the paper concentrates more on analyzing the results of using these tools in the student learning process. The students' marks and the results of several student

  10. Web-based teaching of computer graphics: concepts and realization of an interactive online course

    Microsoft Academic Search

    Reinhard Klein; Frank Hanisch; Wolfgang Straßer

    1998-01-01

    Topics within computer graphics still cannot be adequatelypresented and explored with traditional teaching methodologies andtools. An integrative approach to combine lectures, examples,programming exercises, documentation, supported by a commonsophisticated interface, is greatly needed. In this paper, wediscuss and present the concept, realization, evaluation, andexperiences of a computer graphics course that was developed at ourlab to focus on this need. It is

  11. Web based Teaching of Computer Graphics: Concepts and Realization of an Interactive Online Course

    Microsoft Academic Search

    Reinhard Klein; Frank Hanisch

    1997-01-01

    Topics within computer graphics still cannot be adequately presented and explored with traditional teaching methodologies and tools. An integrative approach to combine lectures, examples, programming exercises, documentation etc. is greatly needed, this supported by a common sophisticated interface. We discuss and present the concept, realization, evaluation, and experiences through a computer graphics course developed at our Lab focusing on this

  12. Computer, Video, and Rapid-Cycling Plant Projects in an Undergraduate Plant Breeding Course.

    ERIC Educational Resources Information Center

    Michaels, T. E.

    1993-01-01

    Studies the perceived effectiveness of four student projects involving videotape production, computer conferencing, microcomputer simulation, and rapid-cycling Brassica breeding for undergraduate plant breeding students in two course offerings in consecutive years. Linking of the computer conferencing and video projects improved the rating of the…

  13. Relationships among Learning Styles and Motivation with Computer-Aided Instruction in an Agronomy Course

    ERIC Educational Resources Information Center

    McAndrews, Gina M.; Mullen, Russell E.; Chadwick, Scott A.

    2005-01-01

    Multi-media learning tools were developed to enhance student learning for an introductory agronomy course at Iowa State University. During fall 2002, the new interactive computer program, called Computer Interactive Multimedia Program for Learning Enhancement (CIMPLE) was incorporated into the teaching, learning, and assessment processes of the…

  14. Effects of types of active learning activity on two junior-level computer engineering courses

    Microsoft Academic Search

    Saurabh Bagchi; Mark C. Johnson; Somali Chaterji

    2008-01-01

    In several computer engineering and computer science courses, it has been observed that active learning activities (ALAs) aid the students in better understanding of the technical material. In this paper, we explore the influence of the type of the ALA and the academic quality of the student on the effectiveness of the technique. We perform the study in two junior

  15. Instructional Material Development for Computer Applications in Adult Business Education Courses. Final Report.

    ERIC Educational Resources Information Center

    Fort Wayne Community Schools, IN.

    The goal of this special demonstration project was to develop adult secondary business education courses related to the computer. An additional phase focused on the development of a microcomputer-based program providing the needed computer literacy and applications for its use. An advisory committee identified five areas of instructional need:…

  16. Design and Delivery of Multiple Server-Side Computer Languages Course

    ERIC Educational Resources Information Center

    Wang, Shouhong; Wang, Hai

    2011-01-01

    Given the emergence of service-oriented architecture, IS students need to be knowledgeable of multiple server-side computer programming languages to be able to meet the needs of the job market. This paper outlines the pedagogy of an innovative course of multiple server-side computer languages for the undergraduate IS majors. The paper discusses…

  17. Mississippi Curriculum Framework for Computer Information Systems Technology. Computer Information Systems Technology (Program CIP: 52.1201--Management Information Systems & Business Data). Computer Programming (Program CIP: 52.1201). Network Support (Program CIP: 52.1290--Computer Network Support Technology). Postsecondary Programs.

    ERIC Educational Resources Information Center

    Mississippi Research and Curriculum Unit for Vocational and Technical Education, State College.

    This document, which is intended for use by community and junior colleges throughout Mississippi, contains curriculum frameworks for two programs in the state's postsecondary-level computer information systems technology cluster: computer programming and network support. Presented in the introduction are program descriptions and suggested course

  18. Design and implementation of evolutionary computation algorithms for volunteer compute networks

    E-print Network

    Mbagwu, Otitochi (Otitochi E.)

    2014-01-01

    We implemented a distributed evolutionary computation system titled EvoGPJ Star (EGS) and deployed the system onto Boinc, a volunteer computing network (VCN). Evolutionary computation is computationally expensive and VCN ...

  19. Problem-based learning in an introductory computer engineering course

    Microsoft Academic Search

    Aaron Striegel; Diane T. Rover

    2002-01-01

    As systems increase in complexity and technology advances, curriculum and laboratories are challenged to keep pace. This is especially true in computer engineering, which has seen dramatic growth in the scope and diversity of computer-based systems. One of the key challenges is developing the educational context for the new technologies, which are being encountered earlier and earlier in a student's

  20. A computer aided teaching course on corrosion of concrete structures

    SciTech Connect

    Ramesht, M.H.; Cottis, R.A. [UMIST, Manchester (United Kingdom)

    1996-10-01

    Computers provide a powerful opportunity for the development of teaching materials. They provide a rich interactive environment to stimulate and engage the student. The advent of computers with multimedia capabilities allows the constructor of teaching materials to show the student material from many sources; text, chart, audio, video, animation, simulation, sound or photographs. When these are combined with interactivity, a powerful learning environment is created. There is currently no CAL (Computer Aided Learning) or CBT (Computer Based Training) material available on the subject of corrosion and corrosion protection in concrete structures for civil engineering students. This paper will describe a Computer Aided Learning package intended to introduce students to the environmental degradation of concrete structures.

  1. Pushing sensor network computation to the edge

    SciTech Connect

    Jean, Evens [Pennsylvania State University] [Pennsylvania State University; Collins, Robert [Pennsylvania State University, University Park, PA] [Pennsylvania State University, University Park, PA; Hurson, Ali [Missouri University of Science and Technology] [Missouri University of Science and Technology; Sedigh, Sahra [Missouri University of Science and Technology] [Missouri University of Science and Technology; Jiao, Yu [ORNL] [ORNL

    2009-01-01

    Sensor Networks consist of multiple devices equipped with some sensing apparatus. The devices in the network may be homogeneous or heterogeneous, yet they will coordinate in order to accomplish a pre-defined task. With the rising interest in the use of Sensor Networks in various applications, the sensor nodes need to subsist in a dynamic environment and react in a timely fashion to environmental stimuli. Unfortunately, the current paradigm in Sensor Network relies on static tasking of the nodes to support a common task; which ultimately leads to deployment of various networks to cover a common area so long as the tasks and owners of these networks differ. Straying away from this paradigm, our work introduces a framework to enable nodes to support dynamic tasking in a dynamic environment by pushing computation to the edge through FPGA-based reconfigurable nodes with increased processing power. Furthermore, we contend that the sensing apparatus available on the nodes limits the range of applications that such nodes will support. As such, reconfigurability of the nodes can yield the most efficient and responsive hardware implementation of algorithms to support common tasks of applications. The benefits of our approach are highlighted through the introduction of a target-tracking node that is reconfigurable and provides increased response time to stimuli.

  2. Computer Networks for Science Teachers. ERIC CSMEE Digest.

    ERIC Educational Resources Information Center

    Roempler, Kimberly S.; Warren, Charles R.

    Formerly reserved for use by scientists, researchers, and computer buffs, computer networks now have capabilities that make them extremely useful to science teachers and their classes. This digest is designed to provide educators with some basic background on computer communications and to provide a few examples of computer networks that are…

  3. Using Type II Computer Network Technology To Reach Distance Students.

    ERIC Educational Resources Information Center

    Eastmond, Dan; Granger, Dan

    1998-01-01

    This article, in a series on computer technology and distance education, focuses on "Type II Technology," courses using textbooks and course guides for primary delivery, but enhancing them with computer conferencing as the main vehicle of instructional communication. Discusses technology proficiency, maximizing learning in conferencing…

  4. Networked Computer Science Technical Reports Library

    NSDL National Science Digital Library

    The goal of the Networked Computer Science Technical Report Library (NCSTRL, pronounced "ancestral") is to provide access to research papers produced at over 60 computer science departments and laboratories worldwide. Users may browse an institution's collection by author or year of publication, or may search through either a simple or an advanced interface. The site aims to advance the field of CS through resource sharing and by exploring related implementation issues. A word of caution: unless using a singular, unique term, avoid the simple search method since "or" operators are implied. Your best bet for searching multiple terms is the advanced search option.

  5. Networked Computer Science Technical Reports Library

    NSDL National Science Digital Library

    1995-01-01

    The goal of the Networked Computer Science Technical Report Library (NCSTRL, pronounced "ancestral") is to provide access to research papers produced at over 60 computer science departments and laboratories worldwide. Users may browse an institution's collection by author or year of publication, or may search through either a simple or an advanced interface. The site aims to advance the field of CS through resource sharing and by exploring related implementation issues. A word of caution: unless using a singular, unique term, avoid the simple search method since "or" operators are implied. Your best bet for searching multiple terms is the advanced search option.

  6. Computational Methods for Modification of Metabolic Networks

    PubMed Central

    Tamura, Takeyuki; Lu, Wei; Akutsu, Tatsuya

    2015-01-01

    In metabolic engineering, modification of metabolic networks is an important biotechnology and a challenging computational task. In the metabolic network modification, we should modify metabolic networks by newly adding enzymes or/and knocking-out genes to maximize the biomass production with minimum side-effect. In this mini-review, we briefly review constraint-based formalizations for Minimum Reaction Cut (MRC) problem where the minimum set of reactions is deleted so that the target compound becomes non-producible from the view point of the flux balance analysis (FBA), elementary mode (EM), and Boolean models. Minimum Reaction Insertion (MRI) problem where the minimum set of reactions is added so that the target compound newly becomes producible is also explained with a similar formalization approach. The relation between the accuracy of the models and the risk of overfitting is also discussed. PMID:26106462

  7. Computational Methods for Modification of Metabolic Networks.

    PubMed

    Tamura, Takeyuki; Lu, Wei; Akutsu, Tatsuya

    2015-01-01

    In metabolic engineering, modification of metabolic networks is an important biotechnology and a challenging computational task. In the metabolic network modification, we should modify metabolic networks by newly adding enzymes or/and knocking-out genes to maximize the biomass production with minimum side-effect. In this mini-review, we briefly review constraint-based formalizations for Minimum Reaction Cut (MRC) problem where the minimum set of reactions is deleted so that the target compound becomes non-producible from the view point of the flux balance analysis (FBA), elementary mode (EM), and Boolean models. Minimum Reaction Insertion (MRI) problem where the minimum set of reactions is added so that the target compound newly becomes producible is also explained with a similar formalization approach. The relation between the accuracy of the models and the risk of overfitting is also discussed. PMID:26106462

  8. Integrating Computer-Mediated Communication into an EAP course

    Microsoft Academic Search

    Xiao Li; Ru-hua Cao

    2006-01-01

    The development of the computer along with the widespread use of the Internet has rapidly promoted Computer-Mediated Communication\\u000a (CMC) as a very important communication media, which can be used widely and effectively in foreign language teaching and learning.\\u000a This essay tries to explore the advantages of CMC as well as its proposed application, beginning with the introduction of\\u000a some concepts

  9. APS Poster Presentation and Networking Courses Help Trainees Prepare for Experimental Biology

    NSDL National Science Digital Library

    APS Education Office (American Physiological Society Education Office)

    2012-06-01

    This article is on page 89 of The Physiologist, June 2012. APS offered two Online Professional Skills Training courses this spring to help trainees prepare for the 2012 Experimental Biology meeting: Â?How to Present a Scientific PosterÂ? and Â?How to Network at a Scientific Meeting.Â? This was the first year that the courses were held and they were both well received.

  10. A quasi-experimental study of three online learning courses in computing

    Microsoft Academic Search

    Thomas M. Connolly; Ewan Macarthur; Mark Stansfield; Evelyn Mclellan

    2007-01-01

    This paper presents the results of a 3-year quasi-experimental study of three Masters courses in computing. The purpose of this study was to investigate the extent to which the teaching and learning of these courses were enhanced by being developed and delivered in an online format as compared to face-to-face full-time and part-time delivery. Key methodological questions and issues to

  11. The dangers of heterogeneous network computing: heterogeneous networks considered harmful

    SciTech Connect

    Demmel, J.; Stanley, K. [California Univ., Berkeley, CA (United States); Dongarra, J. [Oak Ridge National Lab., TN (United States); Hammarling, S.; Osstrouchov, S. [Tennessee Univ., Knoxville, TN (United States)

    1996-12-31

    This report addresses the issue of writing reliable numerical software for networks of heterogeneous computers. Much software has been written for distributed memory parallel computers and in principal such software could readily be ported to networks of machines, such as a collection of workstations connected by Ethernet, but if such a network is not homogeneous there are special challenges that need to be addressed. The symptoms can range from erroneous results returned without warning to deadlock. Some of the problems are straightforward to solve, but for others the solutions are not so obvious and indeed in some cases, such as the method of bisection which we shall discuss in the report, we have not yet decided upon a satisfactory solution that does not incur an unacceptable overhead. Making software robust on heterogeneous systems often requires additional communication. In this report we describe and illustrate the problems and, where possible, suggest solutions so that others may be aware of the potential pitfalls and either avoid them or, if that is not possible, ensure that their software is not used on heterogeneous networks.

  12. Accumulative competition neural network for shortest path tree computation

    Microsoft Academic Search

    Ji-Yang Dong; Wen-Jun Wang; Jun-Ying Zhang

    2003-01-01

    Shortest path tree (SPT) computation is an important combinatorial optimization problem with numerous applications. A novel neural network model called accumulative competition neural network (ACNN) is proposed in this paper to compute the SPT in a given weighted graph. Comparing with the other neural network based search algorithms, the algorithm presented here features in much less number of neurons needed,

  13. Technological networks and the spread of computer viruses

    Microsoft Academic Search

    Justin Balthrop; Stephanie Forrest; Mark E. J. Newman; Matthew M. Williamson

    2004-01-01

    Computer infections such as viruses and worms spread over networks of con- tacts between computers, with different types of networks being exploited by different types of infections. Here we analyze the structures of several of these networks, exploring their implications for modes of spread and the control of infection. We argue that vaccination strategies that focus on a limited number

  14. Training a Quantum Neural Network Department of Computer Science

    E-print Network

    Martinez, Tony R.

    Training a Quantum Neural Network Bob Ricks Department of Computer Science Brigham Young University of machine intelli- gence. The most studied quantum learning algorithm is the quantum neural network. Many to leverage quantum computation in the field of machine intelligence is the idea of a quantum neural network

  15. Computation in Gene Networks Asa Ben-Hur1

    E-print Network

    Siegelmann , Hava T

    computational devices. These include quantum computation [1], DNA compu- tation [2], neural networks [3 and experimentally that chemical reactions can be used to implement Boolean logic and neural networks (see [11 in a recent book [15], mainly from the perspective of neural networks. It is shown there that analog models

  16. COT 3420 -Logic for Computer Science Spring 2014 Course Syllabus

    E-print Network

    Lisetti, Christine

    Educational Publishers Inc, 4th edition, 2011. · Russell and Norvig. Artificial Intelligence - A Modern-later. Some of the homework will not be graded. There will be quizzes on the material taught in class in the Student Handbook. See you in class! Logic for Computer Science - Syllabus - Spring 2014 #12;

  17. CS4670/PH4670, Quantum Computing, Spring 2010 Course Description

    E-print Network

    's Theorem, Classical Fourier analysis [Buskirk08] o What is the Quantum Fourier Transform, and how Instructors: Ted Huffmire (Computer Science) E-mail: tdhuffmi@nps.edu Tel: x7601 Office: GE-233 Office Hours Grading: Student Project, 60% Class Participation and Student Presentations, 40% A student presentation

  18. Integration of Blender 3D in Basic Computer Graphics Course

    E-print Network

    Iyer, Sridhar

    from these, computer based training (CBT) is also found to be useful (Yuan, 2010; Divjak, 2004, Luiz, 2002). Since, in most cases, the software used for CBT is proprietary, the implementation is resource. Blender is a free open source 3D content creation suite, available for all major operating systems under

  19. Computational Fact Checking from Knowledge Networks

    PubMed Central

    Ciampaglia, Giovanni Luca; Shiralkar, Prashant; Rocha, Luis M.; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

    2015-01-01

    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation. PMID:26083336

  20. Computational Fact Checking from Knowledge Networks.

    PubMed

    Ciampaglia, Giovanni Luca; Shiralkar, Prashant; Rocha, Luis M; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

    2015-01-01

    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation. PMID:26083336

  1. Computational fact checking from knowledge networks

    E-print Network

    Ciampaglia, Giovanni Luca; Rocha, Luis M; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

    2015-01-01

    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation...

  2. Course. MCS 401 and EECS 460, Fall 1998: Computer Algorithms I Course home page.http://pobox.com/~djb/401.html

    E-print Network

    Bernstein, Daniel

    Course. MCS 401 and EECS 460, Fall 1998: Computer Algorithms I Course home page for MCS; or talk to the EECS department Instructor.D. J. Bernstein E-mail.djb@math.uic.edu Office.410 SEO Office hours.M 1-4. Other hours by appointment. Prerequisites.C or better in MCS 360 and C

  3. CIS 160 Mathematical Foundations of Computer Science Course Number & Title (A.1) CIS 160 Mathematical Foundations of Computer Science

    E-print Network

    Plotkin, Joshua B.

    (A.5a) What are the basic mathematical concepts and techniques needed in computer science? The course. · The student will learn concepts of graph theory (directed and undirected graphs) and basic connectivity number theory · Basic concepts of set theory · Well-ordered sets and the induction principle · Relations

  4. Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.

    ERIC Educational Resources Information Center

    Pierre, Samuel

    2001-01-01

    Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…

  5. A Mechanism for Congestion Control in Computer Networks Srinivasan Keshav

    E-print Network

    Keshav, Srinivasan

    to deadlock where all traffic comes to a standstill [26]. Existing congestion control schemes treat congestionA Mechanism for Congestion Control in Computer Networks Srinivasan Keshav Computer Systems Research of California, Berkeley, Berkeley, CA 94720. We approach the problem of congestion control in computer networks

  6. Soft Computing Models for Network Intrusion Detection Systems

    E-print Network

    Fernandez, Thomas

    Soft Computing Models for Network Intrusion Detection Systems Ajith Abraham1 and Ravi. Jain2 1 a soft computing approach to detect intrusions in a network. Among the several soft computing paradigms programming and an ensemble method to model fast and efficient intrusion detection systems. Empirical results

  7. Email networks and the spread of computer viruses

    Microsoft Academic Search

    M. E. J. Newman; Stephanie Forrest; Justin Balthrop

    2002-01-01

    Many computer viruses spread via electronic mail, making use of computer users'email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the

  8. Email networks and the spread of computer viruses

    Microsoft Academic Search

    M. E. Newman; Stephanie Forrest; Justin Balthrop

    2002-01-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss

  9. Computing 2-Hop Neighborhoods in Ad Hoc Wireless Networks

    E-print Network

    Calinescu, Gruia

    Computing 2-Hop Neighborhoods in Ad Hoc Wireless Networks Gruia Calinescu 1 Department of ComputerĆcient distributed algorithms for computing 2- hop neighborhoods in Ad Hoc Wireless Networks. The knowledge of the 2-hop neighborhood is assumed in many protocols and algorithms for routing, clustering, and distributed

  10. Computational Neuropsychiatry - Schizophrenia as a Cognitive Brain Network Disorder

    E-print Network

    Dauvermann, Maria R.

    Computational modeling of functional brain networks in fMRI data has advanced the understanding of higher cognitive function. It is hypothesized that functional networks mediating higher cognitive processes are disrupted ...

  11. The academic enhancement program: encouraging students to learn about learning as part of their computing science courses

    Microsoft Academic Search

    Diana Cukierman; Donna McGee Thompson

    2009-01-01

    The Academic Enhancement Program (AEP) at Simon Fraser University has been created to support student learning by integrating activities that introduce students to basic learning theory and strategies into core first-year Computing Science (CS) courses. Program activities include two required workshops run specifically for the CS courses, tailored to course topics. The AEP also includes a third \\

  12. An Activity-Based Sensor Networks Course for Undergraduates with Sun SPOT Devices

    E-print Network

    Bulusu, Nirupama

    across a wide array of applications, ranging from habitat monitoring to reducing energy consumption at Portland State University, we introduced an in-class laboratory component to a sensor networks course that had previously been entirely lecture-based. For the laboratory exercises, we utilized Sun's Java

  13. Capstone Course: Wireless Sensor Networks Experiment ADC: Sensing and Analog-to-Digital Conversion

    E-print Network

    muse Capstone Course: Wireless Sensor Networks Experiment ADC: Sensing and Analog to interface an analog peripheral board to the eZ430 on the CLIO. 3. Understand analog-to-digital conversion. 4 contacts soldered to the eZ430 on the top of the eZ430. If you do not have experience soldering, get

  14. Life-Course Events, Social Networks, and the Emergence of Violence among Female Gang Members

    ERIC Educational Resources Information Center

    Fleisher, Mark S.; Krienert, Jessie L.

    2004-01-01

    Using data gathered from a multi-year field study, this article identifies specific life-course events shared by gang-affiliated women. Gangs emerge as a cultural adaptation or pro-social community response to poverty and racial isolation. Through the use of a social-network approach, data show that violence dramatically increases in the period…

  15. Pwning Level Bosses in MATLAB: Student Reactions to a Game-Inspired Computational Physics Course

    E-print Network

    Beatty, Ian D

    2014-01-01

    We investigated student reactions to two computational physics courses incorporating several videogame-like aspects. These included use of gaming terminology such as "levels," "weapons," and "bosses"; a game-style point system linked to course grades; a self-paced schedule with no deadlines; a mastery design in which only entirely correct attempts earn credit, but students can retry until they succeed; immediate feedback via self-test code; an assignment progression from "minions" (small, focused tasks) to "level bosses" (integrative tasks); and believable, authentic assignment scenarios. Through semi-structured interviews and course evaluations, we found that a majority of students considered the courses effective and the game-like aspects beneficial. In particular, many claimed that the point system increased their motivation; the self-paced nature caused them to reflect on their self-discipline; the possibility and necessity of repeating assignments until perfect aided learning; and the authentic tasks hel...

  16. The Benefits of Combining Computer Technology and Traditional Teaching Methods in Large Enrollment Geocscience Courses

    NSDL National Science Digital Library

    James Durbin

    2002-01-01

    This article describes a study in which data on exam performances and attitudes toward the use of technology were collected from large enrollment, entry-level Geoscience courses over a span of seven semesters. The data were examined to determine if the use of computers as a presentation tool and the incorporation of the internet as a means to give students increased exposure to course content (notes) increased exam scores and knowledge of Earth Sciences. It was noted that one of the important points about the Geosciences is their prominent visual component, an aspect that is well-addressed by the use of computers and the internet. The researchers found that most students found web-based notes to be useful and average exam scores improved. Comprehensive final exam scores also improved, suggesting better preparation for exams and more retention of course information.

  17. ASSESSING THE EFFECTIVENESS OF AN ON-LINE COMPUTER SCIENCE COURSE

    Microsoft Academic Search

    Stamos T. Karamouzis

    Though on-line technologies are rapidly becoming core components of the instructional experience of students little descriptive information exists to address the basic question about the effectiveness of on-line education as a delivery mechanism of computer science content. This article provides an effectiveness assessment of an on-line computer science course. The assessment methodology included a subjective and an objective dimension. The

  18. Curriculum Reform Research of Computer Network Technology Based on School-Enterprise Cooperation

    Microsoft Academic Search

    Peng Liu

    2011-01-01

    \\u000a There is growing concern about falling levels of student engagement with school science, as evidenced by studies of student\\u000a attitudes, and decreasing participation at the post compulsory level. College-enterprise cooperation model is a new model\\u000a of cultivating application-typed talents in college by cooperating with enterprises. In the paper, we analyze the teaching\\u000a problems in the course of “Computer Network Technology”,

  19. Network coding for distributed quantum computation over cluster and butterfly networks

    E-print Network

    Seiseki Akibue; Mio Murao

    2015-03-26

    To apply network coding for quantum computation, we study the distributed implementation of unitary operations over all separated input and output nodes of quantum networks. We consider a setting of networks where quantum communication between nodes is restricted to sending just a qubit, but classical communication is unrestricted. We analyze which N-qubit unitary operations are implementable over cluster networks by investigating transformations of a given cluster network into quantum circuits. We show that any two-qubit unitary operation is implementable over the butterfly network and the grail network, which are fundamental primitive networks for classical network coding. We also analyze probabilistic implementations of unitary operations over cluster networks.

  20. A Survey of Knowledge Management Skills Acquisition in an Online Team-Based Distributed Computing Course

    ERIC Educational Resources Information Center

    Thomas, Jennifer D. E.

    2007-01-01

    This paper investigates students' perceptions of their acquisition of knowledge management skills, namely thinking and team-building skills, resulting from the integration of various resources and technologies into an entirely team-based, online upper level distributed computing (DC) information systems (IS) course. Results seem to indicate that…

  1. Agents and the Semantic Web PhD Course of the Computer

    E-print Network

    Robbiano, Lorenzo

    Agents and the Semantic Web PhD Course of the Computer Science and Engineering Program, DIBRIS, University of Genova (Slide from http://www.urenio.org/2011/11/17/semantic-web-for-smart-cities/) Instructors: According to the seminal work of Berners-Lee, Hendler and Lassila (2001) "The Semantic Web is not a separate

  2. Instructional strategies and tactics for the design of introductory computer programming courses in high school

    Microsoft Academic Search

    Jeroen J. G. Merrienboer; Hein P. M. Krammer

    1987-01-01

    This article offers an examination of instructional strategies and tactics for the design of introductory computer programming courses in high school. We distinguish the Expert, Spiral and Reading approach as groups of instructional strategies that mainly differ in their general design plan to control students' processing load. In order, they emphasize topdown program design, incremental learning, and program modification and

  3. Student attitudes toward a new application of instructional television in a computer programming course

    Microsoft Academic Search

    T. E. Bailey

    1973-01-01

    A new instructional television series for a beginning computer programming course was prepared, using a new format that was designed to be both informative (presented in a well organized, meaningful, clear, and concise manner) and interesting (gaining and maintaining close attention) and making use of special capabilities of the television medium. A television series so designed can overcome to a

  4. Grading by Skill in STEM Courses Eric Freudenthal, Department of Computer Science, UTEP

    E-print Network

    Ward, Karen

    Grading by Skill in STEM Courses Eric Freudenthal, Department of Computer Science, UTEP Francisco lessons and individualized interventions. We report on our approach to skills-based grading, the software we have developed to tabulate grades collected in this manner, and the lessons we have learned from

  5. Pre-Workshop Course Interfaces of Intelligent Computer-Assisted Language Learning

    E-print Network

    Bull, Susan

    Pre-Workshop Course Interfaces of Intelligent Computer-Assisted Language Learning The Ohio State a general introduction to the field, issues specific to open learner modelling in language learning learning environments the learner model contents are not directly presented to the user. Open learner

  6. A Computer-Assisted-Instruction Course in Vocabulary Building through Latin and Greek Roots

    ERIC Educational Resources Information Center

    Scanlan, Richard T.

    1976-01-01

    A course in the enlargement of students' English vocabulary through the study of Latin and Greek roots and their derivatives was developed by the Department of Classics at the University of Illinois. The class makes use of computer assisted instruction on the PLATO IV system. (Author/RM)

  7. Distributed Training for the Reserve Component: Course Conversion and Implementation Guidelines for Computer Conferencing.

    ERIC Educational Resources Information Center

    Hahn, H. A.; And Others

    The purpose of this handbook is to provide background and guidelines for course designers and instructional developers who will be developing Reserve Component training for the United States military using asynchronous computer conferencing techniques. The recommendations in this report are based on an international review of the literature in…

  8. Teaching Web Application Development: A Case Study in a Computer Science Course

    ERIC Educational Resources Information Center

    Del Fabro, Marcos Didonet; de Alimeda, Eduardo Cunha; Sluzarski, Fabiano

    2012-01-01

    Teaching web development in Computer Science undergraduate courses is a difficult task. Often, there is a gap between the students' experiences and the reality in the industry. As a consequence, the students are not always well-prepared once they get the degree. This gap is due to several reasons, such as the complexity of the assignments, the…

  9. Genome evolution, metabolism and Course Computational Biology 2013/2014; Paulien Hogeweg;

    E-print Network

    Utrecht, Universiteit

    of macro evolution and model metabolic regulation in E.coli evolution as tool #12;#12;Some "surprising12 Genome evolution, metabolism and parameters Course Computational Biology 2013/2014; Paulien functional differentiation in one quasispecies Genome evolution: 'mutational priming' by genome structuring

  10. An Assessment of the "Diploma in Computer Engineering" Course in the Technical Education System in Nepal

    ERIC Educational Resources Information Center

    Basnet, Kul Bahadur; Kim, Jinsoo

    2010-01-01

    The purpose of this study was to assess the Diploma in Computer Engineering (DCE) courses offered at affiliated schools of the Council for Technical Education and Vocational Training (CTEVT) with a focus on the goals of the curriculum and employment opportunities. Document analysis, questionnaires, focus group discussions and semi-structured…

  11. Assessing the Impact of a Computer-Based College Algebra Course

    ERIC Educational Resources Information Center

    Ye, Ningjun

    2010-01-01

    USM piloted the Math Zone in Spring 2007, a computer-based program in teaching MAT 101 and MAT 099 in order to improve student performance. This research determined the effect of the re-design of MAT 101 on student achievements in comparison to a traditional approach to the same course. Meanwhile, the study investigated possible effects of the…

  12. The Development of an Online Course to Teach Public Administrators Computer Utilization

    Microsoft Academic Search

    Janet Gubbins; Melanie Clay; Jerry Perkins

    Although there is a growing requirement that public administrators have technology skills, within the Master of Public Administration programs at most universities there are few accommodations for technology training that are both field specific and meet the demands of non-traditional graduate students. Often times the computer courses that are offered are designed to address the needs of students pursuing careers

  13. The MORPG-Based Learning System for Multiple Courses: A Case Study on Computer Science Curriculum

    ERIC Educational Resources Information Center

    Liu, Kuo-Yu

    2015-01-01

    This study aimed at developing a Multiplayer Online Role Playing Game-based (MORPG) Learning system which enabled instructors to construct a game scenario and manage sharable and reusable learning content for multiple courses. It used the curriculum of "Introduction to Computer Science" as a study case to assess students' learning…

  14. Student attitudes toward statistics before and after a computer-integrated introductory statistics course

    Microsoft Academic Search

    Teri Reed Rhoads; Norma Faris Hubele

    2000-01-01

    A validated questionnaire measuring the attitude of engineering students toward statistics was administered to 46 male and 17 female undergraduate engineers during the first and last week of class. The objective was to test the hypothesis that a newly designed computer-integrated statistics course positively affects students' attitudes toward statistics. For the students as a whole, no significant difference is found

  15. A Treatment of Computational Precision, Number Representation, and Large Integers in an Introductory Fortran Course

    Microsoft Academic Search

    William Richardson

    2006-01-01

    Computational precision is sometimes given short shrift in a first programming course. Treating this topic requires discussing integer and floating-point number representations and inaccuracies that may result from their use. An example of a moderately simple programming problem from elementary statistics was examined. It forced students to confront problems associated with number representations and investigate appropriate ways to circumvent them.

  16. Success in Institutionalizing Basic Computer Skills Courses at a Community College Level.

    ERIC Educational Resources Information Center

    Dodge, Lucy

    This article outlines the development of basic computer literacy skills courses under the auspices of the Title III Grant awarded to San Jose City College (SJCC) of San Jose, California by the United States Department of Education (Grant no. PO31A980093, Strengthening Institutions, 1998-2003). The grant has been in effect for 3 years, and grant…

  17. Active and Collaborative Learning in an Introductory Electrical and Computer Engineering Course

    ERIC Educational Resources Information Center

    Kotru, Sushma; Burkett, Susan L.; Jackson, David Jeff

    2010-01-01

    Active and collaborative learning instruments were introduced into an introductory electrical and computer engineering course. These instruments were designed to assess specific learning objectives and program outcomes. Results show that students developed an understanding comparable to that of more advanced students assessed later in the…

  18. AdaGIDE: a friendly introductory programming environment for a freshman computer science course

    Microsoft Academic Search

    Martin C. Carlisle; A. T. Chamillard

    1998-01-01

    We have recently transitioned the programming language in our Introduction to Computer Science course at the U.S. Air Force Academy from Pascal to Ada. Providing an intuitive and straightforward Integrated Development Environment (IDE) for Ada that is suitable for freshman use has been one of our greatest challenges. Although we recognize that a number of Ada IDEs are available, these

  19. Applying Computer-Assisted Musical Instruction to Music Appreciation Course: An Example with Chinese Musical Instruments

    ERIC Educational Resources Information Center

    Lou, Shi-Jer; Guo, Yuan-Chang; Zhu, Yi-Zhen; Shih, Ru-Chu; Dzan, Wei-Yuan

    2011-01-01

    This study aims to explore the effectiveness of computer-assisted musical instruction (CAMI) in the Learning Chinese Musical Instruments (LCMI) course. The CAMI software for Chinese musical instruments was developed and administered to 228 students in a vocational high school. A pretest-posttest non-equivalent control group design with three…

  20. A Short Course in Computational Science and Engineering

    NASA Astrophysics Data System (ADS)

    Yevick, David

    2012-05-01

    1. Introduction; 2. Octave programming; 3. Installing and running the Dev-C++ programming environment; 4. Introduction to computer and software architecture; 5. Fundamental concepts; 6. Procedural programming basics; 7. An introduction to object-oriented analysis; 8. C++ object-oriented programming syntax; 9. Arrays and matrices; 10. Input and output stream; 11. References; 12. Pointers and dynamic memory allocation; 13. Memory management; 14. The static keyword, multiple and virtual inheritance, templates and the STL library; 15. Creating a Java development environment; 16. Basic Java programming constructs; 17. Java classes and objects; 18. Advanced Java features; 19. Introductory numerical analysis; 20. Linear algebra; 21. Fourier transforms; 22. Differential equations; 23. Monte-Carlo methods; 24. Parabolic partial differential equation solvers; Index.

  1. Some queuing network models of computer systems

    NASA Technical Reports Server (NTRS)

    Herndon, E. S.

    1980-01-01

    Queuing network models of a computer system operating with a single workload type are presented. Program algorithms are adapted for use on the Texas Instruments SR-52 programmable calculator. By slightly altering the algorithm to process the G and H matrices row by row instead of column by column, six devices and an unlimited job/terminal population could be handled on the SR-52. Techniques are also introduced for handling a simple load dependent server and for studying interactive systems with fixed multiprogramming limits.

  2. Neural network models for optical computing

    SciTech Connect

    Athale, R.A. (BDM Corp., McLean, VA (USA)); Davis, J. (Office of Naval Research (US))

    1988-01-01

    This volume comprises the record of the conference on neural network models for optical computing. In keeping with the interdisciplinary nature of the field, the invited papers are from diverse research areas, such as neuroscience, parallel architectures, neural modeling, and perception. The papers consist of three major classes: applications of optical neural nets for pattern classification, analysis, and image formation; development and analysis of neural net models that are particularly suited for optical implementation; experimental demonstrations of optical neural nets, particularly with adaptive interconnects.

  3. Deterministic Function Computation with Chemical Reaction Networks.

    PubMed

    Chen, Ho-Lin; Doty, David; Soloveichik, David

    2012-01-01

    Chemical reaction networks (CRNs) formally model chemistry in a well-mixed solution. CRNs are widely used to describe information processing occurring in natural cellular regulatory networks, and with upcoming advances in synthetic biology, CRNs are a promising language for the design of artificial molecular control circuitry. Nonetheless, despite the widespread use of CRNs in the natural sciences, the range of computational behaviors exhibited by CRNs is not well understood. CRNs have been shown to be efficiently Turing-universal (i.e., able to simulate arbitrary algorithms) when allowing for a small probability of error. CRNs that are guaranteed to converge on a correct answer, on the other hand, have been shown to decide only the semilinear predicates (a multi-dimensional generalization of "eventually periodic" sets). We introduce the notion of function, rather than predicate, computation by representing the output of a function f : ? (k) ? ? (l) by a count of some molecular species, i.e., if the CRN starts with x 1, …, xk molecules of some "input" species X 1, …, Xk , the CRN is guaranteed to converge to having f(x 1, …, xk ) molecules of the "output" species Y 1, …, Yl . We show that a function f : ? (k) ? ? (l) is deterministically computed by a CRN if and only if its graph {(x, y) ? ? (k) × ? (l) ? f(x) = y} is a semilinear set. Finally, we show that each semilinear function f (a function whose graph is a semilinear set) can be computed by a CRN on input x in expected time O(polylog ?x?1). PMID:25383068

  4. The Impact of Students' Perceived Computer Experience on Behavior and Performance in an Introductory Information Systems Course

    ERIC Educational Resources Information Center

    Ballou, Deborah J.; Huguenard, Brian R.

    2008-01-01

    In this study the impact of perceived computer experience on the behavior and performance of students in an introductory information systems (IS) course with both lab and lecture components was examined. Perceived computer experience was predicted to affect behavior and performance in the course because of its relationship to positive internal…

  5. A One-Credit Hands-On Introductory Course in Electrical and Computer Engineering Using a Variety of Topic Modules

    ERIC Educational Resources Information Center

    Pierre, J. W.; Tuffner, F. K.; Anderson, J. R.; Whitman, D. L.; Ula, A. H. M. S.; Kubichek, R. F.; Wright, C. H. G.; Barrett, S. F.; Cupal, J. J.; Hamann, J. C.

    2009-01-01

    This paper describes a one-credit laboratory course for freshmen majoring in electrical and computer engineering (ECE). The course is motivational in nature and exposes the students to a wide range of areas of electrical and computer engineering. The authors believe it is important to give freshmen a broad perspective of what ECE is all about, and…

  6. Method for Rapid Recovery Path Computation on Mesh IP Network

    Microsoft Academic Search

    T. Masayuki

    2008-01-01

    A collection of slides from the authorpsilas seminar presentation is given. These discuss centralized management architecture, path computation and restoration, recovery by descending order, greedy algorithm, heuristic algorithm, computation time, network for simulation, test for optimality.

  7. Network-Aware Partitioning of Computation in Diamond

    E-print Network

    Network-Aware Partitioning of Computation in Diamond Alex Nizhner1 Larry Huston2 Peter Steenkiste Pittsburgh, PA 15213 Abstract The Diamond storage architecture enables efficient interactive search efficient use of resources under dynamic conditions, Diamond adaptively partitions computation among

  8. A complex network approach to cloud computing

    E-print Network

    Travieso, Gonzalo; Bruno, Odemir Martinez; Costa, Luciano da Fontoura

    2015-01-01

    Cloud computing has become an important means to speed up computing. One problem influencing heavily the performance of such systems is the choice of nodes as servers responsible for executing the users' tasks. In this article we report how complex networks can be used to model such a problem. More specifically, we investigate the performance of the processing respectively to cloud systems underlain by Erdos-Renyi and Barabasi-Albert topology containing two servers. Cloud networks involving two communities not necessarily of the same size are also considered in our analysis. The performance of each configuration is quantified in terms of two indices: the cost of communication between the user and the nearest server, and the balance of the distribution of tasks between the two servers. Regarding the latter index, the ER topology provides better performance than the BA case for smaller average degrees and opposite behavior for larger average degrees. With respect to the cost, smaller values are found in the BA ...

  9. Quantum computation over the butterfly network

    SciTech Connect

    Soeda, Akihito; Kinjo, Yoshiyuki; Turner, Peter S. [Department of Physics, Graduate School of Science, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo (Japan); Murao, Mio [Department of Physics, Graduate School of Science, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo (Japan); Institute for Nano Quantum Information Electronics, University of Tokyo, 4-6-1 Komaba, Meguro-ku, Tokyo (Japan)

    2011-07-15

    In order to investigate distributed quantum computation under restricted network resources, we introduce a quantum computation task over the butterfly network where both quantum and classical communications are limited. We consider deterministically performing a two-qubit global unitary operation on two unknown inputs given at different nodes, with outputs at two distinct nodes. By using a particular resource setting introduced by M. Hayashi [Phys. Rev. A 76, 040301(R) (2007)], which is capable of performing a swap operation by adding two maximally entangled qubits (ebits) between the two input nodes, we show that unitary operations can be performed without adding any entanglement resource, if and only if the unitary operations are locally unitary equivalent to controlled unitary operations. Our protocol is optimal in the sense that the unitary operations cannot be implemented if we relax the specifications of any of the channels. We also construct protocols for performing controlled traceless unitary operations with a 1-ebit resource and for performing global Clifford operations with a 2-ebit resource.

  10. Quantum computation over the butterfly network

    E-print Network

    Akihito Soeda; Yoshiyuki Kinjo; Peter S. Turner; Mio Murao

    2011-07-14

    In order to investigate distributed quantum computation under restricted network resources, we introduce a quantum computation task over the butterfly network where both quantum and classical communications are limited. We consider deterministically performing a two-qubit global unitary operation on two unknown inputs given at different nodes, with outputs at two distinct nodes. By using a particular resource setting introduced by M. Hayashi [Phys. Rev. A \\textbf{76}, 040301(R) (2007)], which is capable of performing a swap operation by adding two maximally entangled qubits (ebits) between the two input nodes, we show that unitary operations can be performed without adding any entanglement resource, if and only if the unitary operations are locally unitary equivalent to controlled unitary operations. Our protocol is optimal in the sense that the unitary operations cannot be implemented if we relax the specifications of any of the channels. We also construct protocols for performing controlled traceless unitary operations with a 1-ebit resource and for performing global Clifford operations with a 2-ebit resource.

  11. Communications Training Courses Across the Leopold Leadership Network

    NASA Astrophysics Data System (ADS)

    Hayden, T.; Gerber, L. R.; Silver, W. L.

    2012-12-01

    For nearly fifteen years, the Leopold Leadership Program has provided science communication training and support to mid-career academic environmental researchers from across North America. There has been an emphasis throughout on effective communication to non-scientific audiences. Increasingly, Leopold fellows have been developing communications courses for their own students, responding to the need for future scientists to be able to communicate well with the public, the media, policy makers and other audiences. At a June 2012 reunion meeting, a group of past fellows and communications trainers conducted a curriculum exchange, sharing experiences and ideas for successful inclusion of communications training in environmental science curricula. This presentation will present case studies from several institutions, including the use of podcasting, web columns, social media, in-person presentation and other presentation styles for connecting general audiences. We will share best practices, challenges and recommendations for curriculum development and institutional acceptance.

  12. Computers and Communication Networks in Educational Settings in the Twenty-First Century: Preparation for Educators' New Roles.

    ERIC Educational Resources Information Center

    Kook, Joong-Kak

    1997-01-01

    Discussion of changes in classrooms as a result of communication networks focuses on teachers' roles in future educational settings. Topics include teachers as information consultants, as team collaborators, as facilitators, as course developers, and as academic advisors; and the computer and communication skills needed by teachers. (LRW)

  13. Computer Networks as Social Networks: Collaborative Work, Telework, and Virtual Community

    Microsoft Academic Search

    Barry Wellman; Janet Salaff; Dimitrina Dimitrova; Laura Garton; Milena Gulia; Caroline Haythornthwaite

    1996-01-01

    When computer networks link people as well as machines, they become social networks. Such computer-supported social networks (CSSNs) are becoming im- portant bases of virtual communities, computer-supported cooperative work, and telework. Computer-mediated communication such as electronic mail and com- puterized conferencing is usually text-based and asynchronous. It has limited social presence, and on-line communications are often more uninhibited, cre- ative,

  14. Efficiently modeling neural networks on massively parallel computers

    NASA Technical Reports Server (NTRS)

    Farber, Robert M.

    1993-01-01

    Neural networks are a very useful tool for analyzing and modeling complex real world systems. Applying neural network simulations to real world problems generally involves large amounts of data and massive amounts of computation. To efficiently handle the computational requirements of large problems, we have implemented at Los Alamos a highly efficient neural network compiler for serial computers, vector computers, vector parallel computers, and fine grain SIMD computers such as the CM-2 connection machine. This paper describes the mapping used by the compiler to implement feed-forward backpropagation neural networks for a SIMD (Single Instruction Multiple Data) architecture parallel computer. Thinking Machines Corporation has benchmarked our code at 1.3 billion interconnects per second (approximately 3 gigaflops) on a 64,000 processor CM-2 connection machine (Singer 1990). This mapping is applicable to other SIMD computers and can be implemented on MIMD computers such as the CM-5 connection machine. Our mapping has virtually no communications overhead with the exception of the communications required for a global summation across the processors (which has a sub-linear runtime growth on the order of O(log(number of processors)). We can efficiently model very large neural networks which have many neurons and interconnects and our mapping can extend to arbitrarily large networks (within memory limitations) by merging the memory space of separate processors with fast adjacent processor interprocessor communications. This paper will consider the simulation of only feed forward neural network although this method is extendable to recurrent networks.

  15. Network Patch Cables Demystified: A Super Activity for Computer Networking Technology

    ERIC Educational Resources Information Center

    Brown, Douglas L.

    2004-01-01

    This article de-mystifies network patch cable secrets so that people can connect their computers and transfer those pesky files--without screaming at the cables. It describes a network cabling activity that can offer students a great hands-on opportunity for working with the tools, techniques, and media used in computer networking. Since the…

  16. A Study on the Korean Educational Computer Network.

    ERIC Educational Resources Information Center

    Ahn, Moon-Suk

    Future development and operations of the Korean Educational Computer Network are discussed and possible network layout and cost implications are studied. The Aloha System radio communication, telephone lines and satellite systems are considered as possible alternatives to the present network. The availability of telecommunication facilities and…

  17. Computing the Viscosity of Supercooled Liquids: Markov Network Model

    E-print Network

    Lin, Xi

    Computing the Viscosity of Supercooled Liquids: Markov Network Model Ju Li1 *, Akihiro Kushima1 the Viscosity of Supercooled Liquids: Markov Network Model. PLoS ONE 6(3): e17909. doi:10.1371/journal Network model to calculate the shear viscosity of deeply supercooled liquids based on numerical sampling

  18. COMP434/ECOE534 Computer and Network Security

    E-print Network

    Ă?zkasap, Ă?znur

    , Digital Signatures, Authentication Protocols, Access Control Mechanisms, Network Security Practice, TCP Functions - Hash Algorithms - Digital Signatures and Authentication Protocols Network Security PracticeCOMP434/ECOE534 Computer and Network Security Spring 2011 Syllabus Instructor Ă?znur Ă?zkasap

  19. Computation of Normal Logic Programs by Fibring Neural Networks

    E-print Network

    Seda, Anthony Karel

    Computation of Normal Logic Programs by Fibring Neural Networks Vladimir Komendantsky1 and Anthony of the integration of fibring neural net- works (a generalization of conventional neural networks) into model by fibring neural networks of semantic immediate consequence operators TP and TP , where TP denotes

  20. Interfacing Sensor Network to Grid Computing with Database Support

    Microsoft Academic Search

    RICHARD A. WASNIOWSKI

    The widespread distribution and availability of small-scale sensors, actuators, and embedded processors is transforming the physical world into a computing platform. Sensor networks that combine physical sensing capabilities such as temperature, light with networking and computation capabilities are becoming ubiquitous. Applications range from environmental control, warehouse inventory, and health care to scientific and military scenarios. In this paper, we discuss

  1. Computer-Based Semantic Network in Molecular Biology: A Demonstration.

    ERIC Educational Resources Information Center

    Callman, Joshua L.; And Others

    This paper analyzes the hardware and software features that would be desirable in a computer-based semantic network system for representing biology knowledge. It then describes in detail a prototype network of molecular biology knowledge that has been developed using Filevision software and a Macintosh computer. The prototype contains about 100…

  2. Networked simulators and computer-supported wargame simulations

    Microsoft Academic Search

    J. A. W. Mastaglio; Fort Monroe

    1991-01-01

    Networked simulators and computer-supported wargames approaches to simulated training environments that support military collective training of units are discussed. The author attempts to clarify the role of the two technologies in order to facilitate better understanding and to aid further development of each using the most promising scientific ideas. The networking of simulators approach is compared to computer-supported wargaming first

  3. Computational Intelligence in Wireless Sensor Networks: A Survey

    Microsoft Academic Search

    Raghavendra V. Kulkarni; Anna Forster; Ganesh Kumar Venayagamoorthy

    2011-01-01

    Wireless sensor networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. WSNs face many challenges, mainly caused by communication failures, storage and computational constraints and limited power supply. Paradigms of computational intelligence (CI) have been successfully used in recent years to address various challenges such as data aggregation and fusion, energy

  4. Computer network security management and authentication of smart grids operations

    Microsoft Academic Search

    Alexander Hamlyn; Helen Cheung; Todd Mander; Lin Wang; Cungang Yang; Richard Cheung

    2008-01-01

    Operations of electricity power systems have recently become more intricate due to development of microgrids, execution of open access competition, and use of network-controlled devices, etc. Computer networks therefore turn into an integral component of modern power-grid operations. This paper proposes a new utility computer network security management and authentication for actions \\/ commands requests in smart-grid operations. This management

  5. Towards a Theory of In-Network Computation in Wireless Sensor Networks

    E-print Network

    forwarding data packets without modifying the payload of the packets. In contrast, the purpose of a sensor computing functionality in sensor networks carries a whole host of networking issues, because nodes have

  6. Advances in Computer Network Timekeeping NSF Division of Network and Computer Reserach Grant NCR-93-01002

    E-print Network

    Mills, David L.

    1 Advances in Computer Network Timekeeping NSF Division of Network and Computer Reserach Grant NCR and Infrastructure Grant NCR-93-01002, funded from June 1993. It is also a quartely project report for DARPA by contracts and grants from DARPA ITO, U.S. Naval Surface Weapons Center and U.S. Army Research Laboratories

  7. FORTY "STRANGE" COMPUTER-DISCOVERED [and COMPUTER-PROVED (of course!)

    E-print Network

    Zeilberger, Doron

    of this article is in its form. A computer discoveri* *ng ab initio, humanly- nice results, worthy of the name FORTY "STRANGE" COMPUTER-DISCOVERED [and COMPUTER* * and annotated Zeilberger algorithm, implemented in the Maple package twoFone. Foreword (by Human Doron

  8. A concept-first approach for an introductory computer science course

    Microsoft Academic Search

    Linda P. Duhadway; Stephen W. Clyde; Mimi M. Recker; Donald H. Cooley

    2002-01-01

    Several weaknesses have been identified to the programming-first approach often used in introductory computer science courses. Despite these weaknesses, programming continues to be the central focus in CS1 for many institutions. This paper proposes a concept-first approach that can be integrated into existing programming-first curriculum.The approach is based on three principles: a) drawing from the students' everyday experiences to introduce

  9. Evaluating a Web Lecture Intervention in a Human–Computer Interaction Course

    Microsoft Academic Search

    Jason A. Day; James D. Foley

    2006-01-01

    Research using Web lectures to enhance the classroom learning experience in an introductory human-computer interaction course is presented. By using Web lectures to present lecture material before class, more in-class time can be spent engaging students with hands-on learning activities-using class time for more learning by doing, less learning by listening. A quasi-experiment was conducted over a 15-week semester with

  10. “Minds and machines” for humanities majors: A liberal arts course in computers and cognition

    Microsoft Academic Search

    Steven Cushing

    1991-01-01

    A new one-semester course is described in which undergraduate students in non-technical majors are shown how traditional philosophical problems of knowledge, cognition, language, and human nature can be fruitfully investigated with computer-related concepts and techniques. A series of simple experiments is used to demonstrate to undergraduates that mental phenomena are real, that they can be studied experimentally, and that they

  11. Theory VI. Computational Materials Sciences Network (CMSN)

    SciTech Connect

    Zhang, Z Y

    2008-06-25

    The Computational Materials Sciences Network (CMSN) is a virtual center consisting of scientists interested in working together, across organizational and disciplinary boundaries, to formulate and pursue projects that reflect challenging and relevant computational research in the materials sciences. The projects appropriate for this center involve those problems best pursued through broad cooperative efforts, rather than those key problems best tackled by single investigator groups. CMSN operates similarly to the DOE Center of Excellence for the Synthesis and Processing of Advanced Materials, coordinated by George Samara at Sandia. As in the Synthesis and Processing Center, the intent of the modest funding for CMSN is to foster partnering and collective activities. All CMSN proposals undergo external peer review and are judged foremost on the quality and timeliness of the science and also on criteria relevant to the objective of the center, especially concerning a strategy for partnering. More details about CMSN can be found on the CMSN webpages at: http://cmpweb.ameslab.gov/ccms/CMSN-homepage.html.

  12. Analyzing Time Course Gene Expression Data with Biological and Technical Replicates to Estimate Gene Networks by State Space Models

    Microsoft Academic Search

    Osamu Hirose; Ryo Yoshida; Rui Yamaguchi; Seiya Imoto; Tomoyuki Higuchi; Satoru Miyano

    2008-01-01

    In order to estimate accurate gene networks from time course gene expression data, replicated time course data are useful. However, existing methods do not clearly distinguish between biological and technical replicates, while these two kinds of replicates have different features. In this paper, we propose a statistical model based on state space models to use biologically and technically replicated time

  13. Teaching the cloud - experiences in designing and teaching an undergraduate-level course in cloud computing at the Carnegie Mellon University in Qatar

    Microsoft Academic Search

    M. Suhail Rehman; Majd F. Sakr

    2011-01-01

    Cloud computing is a disruptive technology, one that embodies a major conceptual shift and is rapidly changing the way users, developers, and organizations work with computing infrastructure. Carnegie Mellon University in Qatar offered a one-semester undergraduate course to introduce students to cloud computing. In this paper we describe our approach and experiences in designing the course. We describe course elements

  14. A Novel College Network Resource Management Method using Cloud Computing

    NASA Astrophysics Data System (ADS)

    Lin, Chen

    At present information construction of college mainly has construction of college networks and management information system; there are many problems during the process of information. Cloud computing is development of distributed processing, parallel processing and grid computing, which make data stored on the cloud, make software and services placed in the cloud and build on top of various standards and protocols, you can get it through all kinds of equipments. This article introduces cloud computing and function of cloud computing, then analyzes the exiting problems of college network resource management, the cloud computing technology and methods are applied in the construction of college information sharing platform.

  15. Computational models, programming languages and algorithms for sensor networks: towards a paradigm shift in computer science

    Microsoft Academic Search

    G. Agha

    2006-01-01

    Physical devices are increasingly regulated by embedded computers rather than analog controllers. Embedded computers are essentially computational engines capable of sensing the environment, actuating physical devices, carrying out data analysis and planning actions. Embedded computers can thus enable machines to become intelligent and autonomous. The next technological revolution will follow from the ability of intelligent machines to network with other

  16. The one-way quantum computer - a non-network model of quantum computation

    E-print Network

    Robert Raussendorf; Daniel E. Browne; Hans J. Briegel

    2001-08-27

    A one-way quantum computer works by only performing a sequence of one-qubit measurements on a particular entangled multi-qubit state, the cluster state. No non-local operations are required in the process of computation. Any quantum logic network can be simulated on the one-way quantum computer. On the other hand, the network model of quantum computation cannot explain all ways of processing quantum information possible with the one-way quantum computer. In this paper, two examples of the non-network character of the one-way quantum computer are given. First, circuits in the Clifford group can be performed in a single time step. Second, the realisation of a particular circuit --the bit-reversal gate-- on the one-way quantum computer has no network interpretation. (Submitted to J. Mod. Opt, Gdansk ESF QIT conference issue.)

  17. Using a Semantic Information Network to Develop Computer Literacy.

    ERIC Educational Resources Information Center

    Denenberg, Stewart A.

    1980-01-01

    Discusses a semantic network of computer literacy topics and a computer implementation (ACCOLADE) for the PLATO IV system. ACCOLADE was used by learners as a search tool for accessing knowledge about a particular topic in the computer literacy knowledge space and as a mechanism to reveal the structure of that knowledge space. References are…

  18. Soft Computing Models for Network Intrusion Detection Systems

    Microsoft Academic Search

    Ajith Abraham; Ravi Jain

    2004-01-01

    Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. There are two types of intruders: external intruders, who are unauthorized users of the machines they attack, and internal intruders, who have permission to access the system with

  19. Roadmap: Technical and Applied Studies Computer Technology Networking

    E-print Network

    Sheridan, Scott

    Survey of Information Security, Internet Fraud and Computer Forensics 3 C May fulfill writingRoadmap: Technical and Applied Studies ­ Computer Technology Networking ­ Bachelor of Technical 11000 Introduction to Computer Systems (3) or COMT 12000 Personal Productivity Software (3) or MIS 24053

  20. Computational Verb Cellular Networks: Part II-One-Dimensional Computational Verb Local

    Microsoft Academic Search

    2009-01-01

    Computational verb cellular networks (CVCNs) are a new kind of cellular computational platform where the local rules are computational verb rules. In a sister paper(60) 2D CVCNs were studied. In this paper, 1D CVCNs with 1D computational verb local rules are studied. The bifurcations of patterns in 1D CVCNs with computational verb local rules consisting of two computational verbs decrease

  1. COMPUTER ENGINEERING TECHNICAL ELECTIVES (d) 12 credits. ECE Courses all ECE prerequisites must be passed with a C or better

    E-print Network

    COMPUTER ENGINEERING TECHNICAL ELECTIVES (d) 12 credits. ECE Courses ­ all ECE prerequisites must Based Systems (ECE451) 4 F ECE554 Computer Architecture (ECE452 or CS470) 3 F ECE555 Robot Motion Software Development Methods (CS253) 3 F, S CS410 Intro to Computer Graphics (CS253, MATH229 or MATH369) 4

  2. 162 Electrical and Computer Engineering 163 Courses and projects that actively involve them in their own education and

    E-print Network

    Richards-Kortum, Rebecca

    162 Electrical and Computer Engineering 163 · Courses and projects that actively involve them of technology Graduate and undergraduate programs in electrical and computer engineering offer concentrations in electrical and computer engineering that the student can build upon to construct a custom program. Because

  3. An Analysis of the Use of Command Line and Graphic Interface in Computer Instruction for the Communication Research Course.

    ERIC Educational Resources Information Center

    Caplan, Richard E.

    A study investigated whether the computer anxiety of novice users would be reduced more with graphic user interfaces than with command line interfaces. Computers have become an integral part of communication research, and undergraduates are being required to take research courses that necessitate the use of computers. Forty-five students enrolled…

  4. HeNCE: A Heterogeneous Network Computing Environment

    DOE PAGESBeta

    Beguelin, Adam; Dongarra, Jack J.; Geist, George Al; Manchek, Robert; Moore, Keith

    1994-01-01

    Network computing seeks to utilize the aggregate resources of many networked computers to solve a single problem. In so doing it is often possible to obtain supercomputer performance from an inexpensive local area network. The drawback is that network computing is complicated and error prone when done by hand, especially if the computers have different operating systems and data formats and are thus heterogeneous. The heterogeneous network computing environment (HeNCE) is an integrated graphical environment for creating and running parallel programs over a heterogeneous collection of computers. It is built on a lower level package called parallel virtual machine (PVM).more »The HeNCE philosophy of parallel programming is to have the programmer graphically specify the parallelism of a computation and to automate, as much as possible, the tasks of writing, compiling, executing, debugging, and tracing the network computation. Key to HeNCE is a graphical language based on directed graphs that describe the parallelism and data dependencies of an application. Nodes in the graphs represent conventional Fortran or C subroutines and the arcs represent data and control flow. This article describes the present state of HeNCE, its capabilities, limitations, and areas of future research.« less

  5. A new approach to teaching undergraduate thermal\\/fluid sciences—courses in applied computational fluid dynamics and compressible flow

    Microsoft Academic Search

    HOMAYUN K. NAVAZ; BRENDA S. HENDERSON

    A new approach is taken in teaching elective courses in thermal\\/fluid sciences (TFS) specialities primarily to undergraduate students in mechanical, aerospace, and chemical engineering disciplines by incorporating new and advanced technology into the curriculum. Two courses are designed at mezzanine level for undergraduate and graduate students that utilize computational fluid dynamics (CFD) and experimental methods. Techniques to enable undergraduates to

  6. Is It Ethical for Patents to Be Issued for the Computer Algorithms that Affect Course Management Systems for Distance Learning?

    ERIC Educational Resources Information Center

    Moreau, Nancy

    2008-01-01

    This article discusses the impact of patents for computer algorithms in course management systems. Referring to historical documents and court cases, the positive and negative aspects of software patents are presented. The key argument is the accessibility to algorithms comprising a course management software program such as Blackboard. The…

  7. Shared friendship networks and the life course: an analysis of survey data on married and cohabiting couples

    Microsoft Academic Search

    Matthijs Kalmijn

    2003-01-01

    The dyadic withdrawal hypothesis argues that friendship networks become smaller when people enter a cohabiting relationship and that friendship networks become more overlapping with the partner during the course of the relationship. This hypothesis has received fragmented support in earlier research and has not been tested in The Netherlands. A nationally representative data set is analyzed which includes information on

  8. Deterministic Function Computation with Chemical Reaction Networks

    E-print Network

    Doty, David

    systems, "wet robots", smart drugs, etc. #12;4 Chemical Reaction Networks (CRN) syntax: we use only came free with my toilet brush! #12;3 Cells are smart: controlled by signaling and regulatory networks

  9. Dynamic network reconfiguration support for mobile computers

    Microsoft Academic Search

    Jon Inouye; Jim Binkley; Jonathan Walpole

    1997-01-01

    Hot swapping technology combined with pervasive heterogeneous networks empowers mobile laptop users to select the best network device for their current environment. Unfortunately, the m ajority of system software remains \\

  10. Computing with Mobile Agents in Distributed Networks

    E-print Network

    Kranakis, Evangelos

    .......................... 1-12 1.7 Network Decontamination and Black Holes ....... 1-15 Network decontamination · Black holes the decontamination problem and black hole search. 1.2 Modeling Mobile Agents in Distribu

  11. Verifying functional requirements in multi-layer networks: a case for formal description of computer networks

    E-print Network

    Vellekoop, Michel

    , The Netherlands #12;Abstract Major outages and hacks in corporate networks show that the mounting complexityVerifying functional requirements in multi-layer networks: a case for formal description of computer networks Maarten Aertsen maarten@rtsn.nl 4096R/14789500 March 5, 2014 Master of Science thesis

  12. A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with a Connectionless Network Layer

    E-print Network

    Jain, Raj

    A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with a Connectionless 1988) ACM SIGCOMM -138- ComputerCommunication Review #12;A Binary Feedback Scheme for Congestion and for pathological conditions. We propose a scheme for congestion avoidance in networks using a connectionless

  13. A Queueing Network Analysis of Computer Communication Networks with Window Flow Control

    Microsoft Academic Search

    MARTIN REISER

    1979-01-01

    A computer communication network with window flow control is modeled by a closed multichain queueing network. The severe computational limitation of previous solution algorithms is overcome with a heuristic derived from the recently found mean value analysis. A large numerical example is given.

  14. Unsolicited relay network for mobile computing

    Microsoft Academic Search

    Tzu-Chi Huang; Ce-Kuen Shieh; Yu-Ben Miao

    2005-01-01

    Because of Internet routing fundamentals, mobile devices' network configurations have to be adjusted to correspond with the visited network. No matter people adjust it manually or let mobile devices do it automatically, the trouble unavoidably interrupts the continuity of network access. Although many solutions have been proposed, they need people to install related software in mobile devices. Installing related software

  15. A network architecture for heterogeneous mobile computing

    Microsoft Academic Search

    Eric A. Brewer; Randy H. Katz; YATIN CHAWATHE; STEVEN D. GRIBBLE; TODD HODES; Giao Nguyen; MARK STEMM; TOM HENDERSON; ELAN AMIR; H. Balakrishnan; A. Fox; V. N. Padmanabhan; S. Seshan

    1998-01-01

    This article summarizes the results of the BARWAN project, which focused on enabling truly useful mobile networking across an extremely wide variety of real-world networks and mobile devices. We present the overall architecture, summarize key results, and discuss four broad lessons learned along the way. The architecture enables seamless roaming in a single logical overlay network composed of many heterogeneous

  16. Computing with Time: From Neural Networks to Sensor Networks

    E-print Network

    Varela, Carlos

    processor, using only O(1) broadcasts. When applied to sensor networks, the Lecture Hall Algorithm leads, i.e., the broadcast. In a biological neural network, a firing neuron sends an action potential and amplification to the transmitted signal. Similarly, a communication node in a sensor network broadcasts its

  17. International Financial Networks with Intermediation: Modeling, Analysis, and Computations

    E-print Network

    Nagurney, Anna

    of the various financial agents/sectors in an economy, such as banks, households, insurance companies, etc is typically associated with financial businesses, including banks, savings institutions, investmentInternational Financial Networks with Intermediation: Modeling, Analysis, and Computations Anna

  18. Network: Computation in Neural Systems 2012, 119, Early Online

    E-print Network

    Graham, Bruce

    network models SHARON M. CROOK1,2 , JAMES A. BEDNAR3 , SANDRA BERGER2 , ROBERT CANNON4 , ANDREW P. DAVISON and Mathematics, University of Stirling, Stirling, UK, 11 Institute of Computer Science, University of Rostock

  19. Multiproduct Humanitarian Healthcare Supply A Network Modeling and Computational

    E-print Network

    Nagurney, Anna

    Multiproduct Humanitarian Healthcare Supply Chains: A Network Modeling and Computational Framework-23, 2012 University of Massachusetts Amherst Multiproduct Humanitarian Healthcare Supply Chains #12 Humanitarian Healthcare Supply Chains #12;Outline Background and Motivation An Overview of the Relevant

  20. Global, Computer-generated Map of Valley Networks on Mars

    NASA Astrophysics Data System (ADS)

    Luo, W.; Stepinski, T. F.

    2009-03-01

    The new, global map of valley networks on Mars has been created entirely by a computer algorithm parsing topographic data. Dependencies between dissection density and its potential controlling factors are derived and discussed.

  1. ECEN 621-600: Mobile Wireless Networking, Spring 2009 A Course Targeting at State-of-The-Art Knowledge In Advanced Wireless

    E-print Network

    Zhang, Xi

    ECEN 621-600: Mobile Wireless Networking, Spring 2009 A Course Targeting at State-of-The-Art Knowledge In Advanced Wireless Communications and Networking Design & Analysis Techniques INSTRUCTOR: Prof, protocols, and modeling techniques for mobile wireless networks. The course aims at equipping graduate

  2. Use of Physical Simulation, Computer Simulation, and a Common Product in a Series of Courses to Illu

    NSDL National Science Digital Library

    Carlisle, Tom

    Use of Physical & Computer Simulation and a Standard Product in a Series of Courses to Illustrate Industrial and Manufacturing Engineering Technology Principles This presentation will explain the use of Physical Three-Dimensional Simulation and Computer Simulation coupled with a simple, standard product to teach various principles of Industrial and Manufacturing Engineering Technology throughout several different courses. This product (a simple model wagon), along with a variety of options, is threaded through several courses, allowing students to keep a common frame of reference, while seeing how the various principles within the courses tie together. Every course has a team oriented lab project which allows the students to build their team work and communication skills. This teaching methodology also allows the use of active, hands-on learning for the purpose of process improvement and leadership development. As the courses progress, the students will experience the transformation of the product assembly process from rudimentary assembly, to the effective use of fixtures and workstation design to reduce operator effort and improve productivity. It culminates with the course on Lean Manufacturing which also introduces the use of production simulation using in-house designed and manufactured equipment that allows us to integrate component manufacturing along with product assembly. The presentation will include video clips of the various course projects and principles, a computer simulation and samples of the products. The use of these concepts presented allows students to experience real life examples in the classroom that closely mimic what they will see in industry.

  3. Design of neuromorphic logic networks and fault-tolerant computing

    Microsoft Academic Search

    A. H. Tran; S. N. Yanushkevich; S. E. Lyshevski; V. P. Shmerko

    2011-01-01

    This paper studies robust fault-tolerant neuromorphic computing to support enabling application-specific design and enable emerging nanoscaled microelectronics. We develop an energy-centric probabilistic design concept and propose a library of neuromorphic networks for logic functions. These developments enable robustness, failure tolerance capabilities, adaptation and reconfiguration of complex large-scale networks. The proposed methods and tools in design of neuromorphic networks are verified

  4. Computing Deblurred Time-Frequency Distributions Using Artificial Neural Networks

    Microsoft Academic Search

    Imran Shafi; Jamil Ahmad; Syed Ismail Shah; Faisal M. Kashif

    2008-01-01

    This paper presents an effective correlation vectored taxonomy algorithm to compute highly concentrated time-frequency distributions\\u000a (TFDs) using localized neural networks (LNNs). Spectrograms and pre-processed Wigner–Ville distributions of known signals\\u000a are vectorized and clustered as per the elbow criterion to constitute the training data for multiple artificial neural networks.\\u000a The best trained networks become part of the LNNs. Test TFDs of

  5. Computer Network Security: Best Practices for Alberta School Jurisdictions.

    ERIC Educational Resources Information Center

    Alberta Dept. of Education, Edmonton.

    This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…

  6. Financial Networks with Electronic Transactions: Modeling, Analysis, and Computations

    E-print Network

    Nagurney, Anna

    institutions have had an enormous effect on financial ser- vices and the options available for financialFinancial Networks with Electronic Transactions: Modeling, Analysis, and Computations Anna Nagurney the economic landscape for financial decision-making. In this paper, we focus on financial networks

  7. A multilayer neural network system for computer access security

    Microsoft Academic Search

    M. S. Obaidat; D. T. Macchairolo

    1994-01-01

    This paper presents a new multilayer neural network system to identify computer users. The input vectors were made up of the time intervals between successive keystrokes created by users while typing a known sequence of characters. Each input vector was classified into one of several classes, thereby identifying the user who typed the character sequence. Three types of networks were

  8. Robust and Distributed Computation of Aggregates in Wireless Sensor Networks

    Microsoft Academic Search

    Jen-Yeu Chen; Gopal Pandurangan; Dongyan Xu

    2004-01-01

    A wireless sensor network consists of a large number of small, resource-constrained devices and usually operates in hostile environments that are prone to link and node failures. Computing aggregates such as average, minimum, maximum and sum is fundamental to various primitive functions of a sensor network like system monitoring, data querying, and collaborative information processing. In this paper we present

  9. Computer Networking Strategies for Building Collaboration among Science Educators.

    ERIC Educational Resources Information Center

    Aust, Ronald

    The development and dissemination of science materials can be associated with technical delivery systems such as the Unified Network for Informatics in Teacher Education (UNITE). The UNITE project was designed to investigate ways for using computer networking to improve communications and collaboration among university schools of education and…

  10. A COMPUTATIONAL THEORY OF DECISION NETWORKS Nevin Lianwen Zhang

    E-print Network

    Zhang, Nevin L.

    a decision network is decomposable, a divide and conquer strategy can be utilized to aid its evaluationA COMPUTATIONAL THEORY OF DECISION NETWORKS By Nevin Lianwen Zhang B. Sc. (Mathematics) China how to represent and solve decision problems in Bayesian decision the­ ory (e.g. Fishburn 1988

  11. A Computational Theory of Decision Networks Nevin Lianwen Zhang

    E-print Network

    Zhang, Nevin L.

    a decision network is decomposable, a divide­and­conquer strategy can be utilized to aid its evaluationA Computational Theory of Decision Networks Nevin Lianwen Zhang CS Department, Hong Kong University This paper is about how to represent and solve decision problems in Bayesian decision theory (e.g. [6

  12. The Shared Discourse of the Networked Computer Classroom.

    ERIC Educational Resources Information Center

    Irvin, L. Lennie

    1999-01-01

    Argues that networked classrooms offer a number of opportunities for effective writing instruction. Argues that shared discourse in the networked-computer classroom has three levels forming a continuum of interactivity: students sending messages "at,""to," and "between" each other. Offers classroom examples of each level of discourse. (SR)

  13. Distributed computing for plug-and-play network service configuration

    Microsoft Academic Search

    Syed Kamran Raza; Bernard Pagurek; Tony White

    2000-01-01

    Configuration of network services is a difficult problem requiring considerable human involvement. As the peripheral configuration of PCs has been made easier through plug-and- play hardware, service configuration can be facilitated by defining PnP services for networks. Moreover, the recent developments in the area of distributed computing technologies, such as CORBA, Mobile Agents, and Jini, and the ever improving Java

  14. Robust and Distributed Computation of Aggregates in Wireless Sensor Networks

    E-print Network

    Chen, Jen-Yeu "Cosmos"

    and is naturally robust against dynamic topology changes from link/node failures. Although our algorithm is natural Probabilistic algorithms, Randomized algorithms, Distributed algorithms, Sensor networks, Fault tolerance, Graph. Deterministic tree-based in-network approaches have been successfully developed to compute aggregates[19], [20

  15. Word Reading in Damaged Connectionist Networks: Computational and Neuropsychological Implications

    E-print Network

    Plaut, David C.

    Word Reading in Damaged Connectionist Networks: Computational and Neuropsychological Implications of a network is evaluated by testing how well its performance generalizes to novel external input drawn from, the field of cognitive neuropsychology attempts to re- late their patterns of impaired and preserved

  16. TELEVISION BROADCAST NETWORKS: FROM CENTRALISED AUTOMATION CONTROL TO DISTRIBUTED COMPUTING

    Microsoft Academic Search

    K. Glasman; A. Peregudov; V. Lichakov; B. Shetinin

    Competition in the media industry causes broadcasters to increase the cost- effectiveness of network broadcasting. It requires the unification the technology of interaction of a local broadcaster with several national network broadcasters. A key technology supporting such systems is distributed computing. That is why the main purpose of the project described in the current paper is to support experimental research

  17. The Role of Computer Networks in Aerospace Engineering.

    ERIC Educational Resources Information Center

    Bishop, Ann Peterson

    1994-01-01

    Presents selected results from an empirical investigation into the use of computer networks in aerospace engineering based on data from a national mail survey. The need for user-based studies of electronic networking is discussed, and a copy of the questionnaire used in the survey is appended. (Contains 46 references.) (LRW)

  18. Ideas for projects in undergraduate information assurance and security courses

    Microsoft Academic Search

    Ahmad Ghafarian

    2007-01-01

    In this work, we present some ideas for projects that can be used in undergraduate Information Assurance and Security (IAS) courses. The projects range from cryptanalysis of ciphertext, network security, security vulnerability analysis, and programming to demonstrate buffer overflow. The projects can be used in IAS courses such as cryptography, network security, and computer security. Alternatively, they can be used

  19. Temporal Distance Metrics for Social Network Analysis Computer Laboratory

    E-print Network

    Mascolo, Cecilia

    of Cambridge jkt27@cam.ac.uk Mirco Musolesi Computer Laboratory University of Cambridge mm753@cam.ac.uk Cecilia Mascolo Computer Laboratory University of Cambridge cm542@cam.ac.uk Vito Latora Dipartimento di Fisica- tracted a lot of attention as social networking applications and mobile sensing devices have given us

  20. Linear circuits for neural networks and affective computing.

    PubMed

    Frenger, P

    1999-01-01

    Biological phenomena are often modeled with software on digital computers, even though the events may be analog in nature. The author describes the use of linear circuitry in two areas of biological simulation: artificial neural networks and affective computing. The operational amplifier, with the assistance of some new analog chips and simple digital microcontrollers, is featured prominently in these linear designs. PMID:11143356

  1. Network-Aware Partitioning of Computation in Diamond

    E-print Network

    Network-Aware Partitioning of Computation in Diamond Alex Nizhner 1 Larry Huston 2 Peter Steenkiste Pittsburgh, PA 15213 Abstract The Diamond storage architecture enables eĆcient interactive searchĆcient use of resources under dynamic conditions, Diamond adaptively partitions computation among the storage

  2. Ethernet: distributed packet switching for local computer networks

    Microsoft Academic Search

    Robert M. Metcalfe

    1976-01-01

    Ethernet is a branching broadcast communication system for carrying digital data packets among locally distributed computing stations. The packet transport mechanism provided by Ethernet has been used to build systems which can be viewed as either local computer networks or loosely coupled multiprocessors. An Ethernet's shared communication facility, its Ether, is a passive broadcast medium with no central control. Coordination

  3. Throughput and Fairness in Random Access Networks Computer Science Department

    E-print Network

    Throughput and Fairness in Random Access Networks Hoon Chang Computer Science Department Columbia University New York, NY 10027 Email: hchang@cs.columbia.edu Vishal Misra Computer Science Department Columbia an throughput analysis of log- utility and max-min fairness. Assuming all nodes interfere with each other

  4. Analytic and simulation methods in computer network design*

    E-print Network

    Kleinrock, Leonard

    familiar) is the Defense Department's Advanced Research Projects Agency (ARPA) experimental computer of the Advanced Research Projects Agency, who originally conceived this system. Reference 6, which appears Projects Agency of the Department of Defense (DAHC15-69-C-0285). THE ARPA EXPERIMENTAL COMPUTER NETWORK

  5. What Networking of Information Can Do for Cloud Computing

    Microsoft Academic Search

    Börje Ohlman; Anders Eriksson; René Rembarz

    2009-01-01

    Cloud computing is making it possible to separate the process of building an infrastructure for service provisioning from the business of providing end user services. Today, such infrastructures are normally provided in large data centres and the applications are executed remotely from the users. One reason for this is that cloud computing requires a reasonably stable infrastructure and networking environment,

  6. Speckled computing: disruptive technology for networked information appliances

    Microsoft Academic Search

    D. K. Arvind; K. J. Wong

    2004-01-01

    Speckled Computing is an emerging technology in which data will be sensed in minute (ultimately around one cubic millimetre) semiconductor grains called Specks. Information will be extracted, exchanged and processed in a collaborative fashion in a wireless network of thousands of Specks, called a Specknet. The impact of Speckled Computing on consumer electronics, especially future information appliances, will be disruptive.

  7. Computational Approaches for Analyzing Information Flow in Biological Networks

    NSDL National Science Digital Library

    Boris Kholodenko (University College Dublin; Systems Biology Ireland REV)

    2012-04-17

    How do cells perceive their environment and produce appropriate responses? The sensing and coordination of proper responses is coordinated by intricate biochemical networks that integrate signals and compute biological responses with high fidelity and reproducibility. Modern “omics” (proteomics, genomics, lipidomics, and metabolomics) techniques have identified many of the components of these networks, but researchers are now faced with the challenge of unraveling how the components are connected and how they compute. To elucidate these network properties, various mathematical and computational modeling techniques are used because their complexity defeats human intuition. The results indicate that signaling networks show a wide diversity of behaviors encoded in their design, but that they are also very flexible, with cells adapting their networks in response to different contexts by changing connectivities. The remaining challenges include integration of data generated with methods for the analysis of different types of networks (gene regulation, protein modification, and metabolic networks), and generation of coherent network interpretations that are widely accessible and can generate new hypotheses that are experimentally testable and that will push the knowledge frontier in biology and biomedicine.

  8. Self-Assessment and Student Improvement in an Introductory Computer Course at the Community College-Level

    ERIC Educational Resources Information Center

    Spicer-Sutton, Jama

    2013-01-01

    The purpose of this study was to determine a student's computer knowledge upon course entry and if there was a difference in college students' improvement scores as measured by the difference in pretest and posttest scores of new or novice users, moderate users, and expert users at the end of a college-level introductory computing class.…

  9. Reaching Distance Students with Computer Network Technology (Part III).

    ERIC Educational Resources Information Center

    Eastmond, Daniel; Granger, Daniel

    1997-01-01

    This article is third in a series on the technology used in distance education courses at the Center for Distance Education at the State University of New York's Empire State College. Discusses student access to computer technology, describes various hardware and software environments at the college, and lists suggestions to improve student…

  10. Constraint methods for neural networks and computer graphics

    SciTech Connect

    Platt, J.C.

    1989-01-01

    Both computer graphics and neural networks are related, in that they model natural phenomena. Physically-based models are used by computer graphics researchers to create realistic, natural animation, and neural models are used by neural network researchers to create new algorithms or new circuits. To exploit successfully these graphical and neural models, engineers want models that fulfill designer-specified goals. These goals are converted into mathematical constraints. This thesis presents constraint methods for computer graphics and neural networks. The mathematical constraint methods modify the differential equations that govern the neural or physically-based models. The constraint methods gradually enforce the constraints exactly. This thesis also described application of constrained models to real problems. The first half of this theses discusses constrained neural networks. The desired models and goals are often converted into constrained optimization problems. These optimization problems are solved using first-order differential equations. The applications of constrained neural networks include the creation of constrained circuits, error-correcting codes, symmetric edge detection for computer vision, and heuristics for the traveling salesman problem. The second half of this thesis discusses constrained computer graphics models. In computer graphics, the desired models and goals become constrained mechanical systems, which are typically simulated with second-order differential equations. The Penalty Method adds springs to the mechanical system to penalize violations of the constraints. Rate Controlled Constraints add forces and impulses to the mechanical system to fulfill the constraints with critically damped motion.

  11. Wireless Networks: New Meaning to Ubiquitous Computing.

    ERIC Educational Resources Information Center

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  12. Computing in Social Networks Andrei Giurgiu1

    E-print Network

    Paris-Sud XI, Université de

    that enables secret sharing and distributed verifica- tions which leverage the social aspect of the network of such networks is still growing regularly by the day, e.g. Facebook boasts by now more than 400 millions users, this poses several privacy problems, besides scalability. For instance, there is no guarantee that Facebook

  13. Computing in Social Networks Andrei Giurgiu1

    E-print Network

    Guerraoui, Rachid

    that enables secret sharing and distributed verifications which leverage the social aspect of the network of such networks is still growing regularly by the day, e.g. Facebook boasts by now more than 400 millions users, this poses several privacy problems, besides scalability. For instance, there is no guarantee that Facebook

  14. HPC Interconnection Networks: The Key to Exascale Computing

    SciTech Connect

    Vetter, Jeffrey S [ORNL; Tipparaju, Vinod [ORNL; Yu, Weikuan [ORNL; Roth, Philip C [ORNL

    2010-01-01

    Scientists from many domains desire to address problems within the next decade that, by all estimates, require computer systems that can achieve sustained exaflop computing rates (i.e., 1 x 10{sup 18} floating point operations per second) with real-world applications. Simply scaling existing designs is insufficient: analysis of current technological trends suggests that only a few architectural components are on track to reach the performance levels needed for exascale computing. The network connecting computer system nodes presents a particularly difficult challenge because of the prevalence of a wide variety of communication patterns and collective communication operations in algorithms used in scientific applications and their tendency to be the most significant limit to application scalability. Researchers at Oak Ridge National Laboratory and elsewhere are actively working to overcome these network-related scalability barriers using advanced hardware and software design, alternative network topologies, and performance prediction using modeling and simulation.

  15. Tools for Heterogeneous Network Computing Adam Begueliny

    E-print Network

    Dongarra, Jack

    computational grand challenges. The user views PVM as a loosely coupled distributed-memory computer programmed in C or Fortran with message-passing extensions. The hardware that composes the user's perso

  16. An approach to a Cloud Computing network

    Microsoft Academic Search

    Francesco Maria Aymerich; Gianni Fenu; Simone Surcis

    2008-01-01

    ldquoCloud Computingrdquo is becoming increasingly relevant, as it will enable companies involved in spreading this technology to open the doors to Web 3.0. In this work the basic features of cloud computing are presented and compared with those of the original technology: Grid Computing. The new categories of services introduced will slowly replace many types of computational resources currently used.

  17. Phoebus: Network Middleware for Next-Generation Network Computing

    SciTech Connect

    Martin Swany

    2012-06-16

    The Phoebus project investigated algorithms, protocols, and middleware infrastructure to improve end-to-end performance in high speed, dynamic networks. The Phoebus system essentially serves as an adaptation point for networks with disparate capabilities or provisioning. This adaptation can take a variety of forms including acting as a provisioning agent across multiple signaling domains, providing transport protocol adaptation points, and mapping between distributed resource reservation paradigms and the optical network control plane. We have successfully developed the system and demonstrated benefits. The Phoebus system was deployed in Internet2 and in ESnet, as well as in GEANT2, RNP in Brazil and over international links to Korea and Japan. Phoebus is a system that implements a new protocol and associated forwarding infrastructure for improving throughput in high-speed dynamic networks. It was developed to serve the needs of large DOE applications on high-performance networks. The idea underlying the Phoebus model is to embed Phoebus Gateways (PGs) in the network as on-ramps to dynamic circuit networks. The gateways act as protocol translators that allow legacy applications to use dedicated paths with high performance.

  18. The LearningOnline Network with Computer-

    E-print Network

    management is: a cross-institutional cross- disciplinary content repository a tool to seamlessly assemble Management · Content Repository · Content Assembly · Course Management · Assessment · Open Source and Free Repository "The aisles of your supermarket" LON-CAPA 8 Bottom: Content Repository LON-CAPA 9 Bottom: Content

  19. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  20. Computer network access to scientific information systems for minority universities

    NASA Astrophysics Data System (ADS)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  1. Computer Networks in the X-USSR: Technology, Uses and Social Effects.

    ERIC Educational Resources Information Center

    Travica, Bob; Hogan, Matthew

    1992-01-01

    Describes a study of the current state of computer networks in the countries of the former Soviet Union (X-USSR). Four wide area networks are described; network uses and services are examined; social effects of computer networks are considered; and the development of the computer and telecommunications industry in X-USSR countries is discussed.…

  2. Quantization in acquisition and computation networks

    E-print Network

    Sun, John Zheng

    2013-01-01

    In modern systems, it is often desirable to extract relevant information from large amounts of data collected at different spatial locations. Applications include sensor networks, wearable health-monitoring devices and a ...

  3. Deterministic Function Computation with Chemical Reaction Networks

    E-print Network

    Doty, David

    controllers for biochemical systems, "wet robots", smart drugs, etc. Need to understand theoretical principles for existing systems) #12;3 Cells are smart: controlled by signaling and regulatory networks source: David

  4. The effect of a computer?assisted language learning course on pre?service English teachers’ practice teaching

    Microsoft Academic Search

    Ferit K?l?çkaya

    2009-01-01

    This paper reports the findings of a study conducted to find out the effect of an undergraduate?level computer?assisted language learning (CALL) course on pre?service English teachers’ practice teaching. Content analysis techniques were used to examine the resulting responses to the interview questions and the lesson plans for the effects of the course. Findings indicate that the participants have benefited from

  5. Using an isolated network laboratory to teach advanced networks and security

    Microsoft Academic Search

    John M. D. Hill; Curtis A. Carver Jr.; Jeffrey W. Humphries; Udo W. Pooch

    2001-01-01

    This paper discusses the use of an isolated network laboratory to teach computer security using persistent cooperative groups and an active learning approach. Computer security and computer security education are areas of increasing importance as computer systems become more interconnected. When offered, undergraduate and graduate computer security courses are routinely taught using a traditional lecture format. If the course includes

  6. Six networks on a universal neuromorphic computing substrate.

    PubMed

    Pfeil, Thomas; Grübl, Andreas; Jeltsch, Sebastian; Müller, Eric; Müller, Paul; Petrovici, Mihai A; Schmuker, Michael; Brüderle, Daniel; Schemmel, Johannes; Meier, Karlheinz

    2013-01-01

    In this study, we present a highly configurable neuromorphic computing substrate and use it for emulating several types of neural networks. At the heart of this system lies a mixed-signal chip, with analog implementations of neurons and synapses and digital transmission of action potentials. Major advantages of this emulation device, which has been explicitly designed as a universal neural network emulator, are its inherent parallelism and high acceleration factor compared to conventional computers. Its configurability allows the realization of almost arbitrary network topologies and the use of widely varied neuronal and synaptic parameters. Fixed-pattern noise inherent to analog circuitry is reduced by calibration routines. An integrated development environment allows neuroscientists to operate the device without any prior knowledge of neuromorphic circuit design. As a showcase for the capabilities of the system, we describe the successful emulation of six different neural networks which cover a broad spectrum of both structure and functionality. PMID:23423583

  7. A Quantum Neural Network Computes Entanglement

    E-print Network

    E. C. Behrman; V. Chandrashekar; Z. Wang; C. K. Belur; J. E. Steck; S. R. Skinner

    2002-02-22

    An outstanding problem in quantum computing is the calculation of entanglement, for which no closed-form algorithm exists. Here we solve that problem, and demonstrate the utility of a quantum neural computer, by showing, in simulation, that such a device can be trained to calculate the entanglement of an input state, something neither an algorithmic quantum computer nor a classical neural net can do.

  8. Inferring cluster-based networks from differently stimulated multiple time-course gene expression data

    PubMed Central

    Shiraishi, Yuichi; Kimura, Shuhei; Okada, Mariko

    2010-01-01

    Motivation: Clustering and gene network inference often help to predict the biological functions of gene subsets. Recently, researchers have accumulated a large amount of time-course transcriptome data collected under different treatment conditions to understand the physiological states of cells in response to extracellular stimuli and to identify drug-responsive genes. Although a variety of statistical methods for clustering and inferring gene networks from expression profiles have been proposed, most of these are not tailored to simultaneously treat expression data collected under multiple stimulation conditions. Results: We propose a new statistical method for analyzing temporal profiles under multiple experimental conditions. Our method simultaneously performs clustering of temporal expression profiles and inference of regulatory relationships among gene clusters. We applied this method to MCF7 human breast cancer cells treated with epidermal growth factor and heregulin which induce cellular proliferation and differentiation, respectively. The results showed that the method is useful for extracting biologically relevant information. Availability: A MATLAB implementation of the method is available from http://csb.gsc.riken.jp/yshira/software/clusterNetwork.zip Contact: yshira@riken.jp Supplementary information: Supplementary data are available at Bioinformatics online. PMID:20223837

  9. Schemas and neural networks for sixth generation computing

    SciTech Connect

    Arbib, M.A. (Center for Neural Engineering, Univ. of Southern California, Los Angeles, CA (US))

    1989-04-01

    The study of animal and human brains suggests overall architectural principles for sixth generation computers. Each such machine will comprise a network of more specialized devices, with many of these devices structured as highly parallel arrays of interacting neuron-like, possibly adaptive, components. The authors stress the interaction between computational neurobiology and neural engineering and note the two grains of analysis of schemas and neural networks, arguing that schemas will be the programming language of the sixth generation. After a brief introduction to the variety of neuron models now current, schemas are exemplified in a discussion of high-level vision. The paper emphasizes the domain-specific structure neural networks, as well as emphasizing that technologists have much to learn from the study of neurobiological systems. The authors close with a brief account of adaptation and the programming of sixth generation computers.

  10. A generic proxy system for networked computer games

    Microsoft Academic Search

    Martin Mauve; Stefan Fischer; Jörg Widmer

    2002-01-01

    In this work-in-progress report we present the general outline of a research project which aims at providing proxy support for networked computer games. The problems of both client-server and fully replicated architectures are discussed and we reason that employing proxy technology, which has been successfully used for other networked applications, is advantageous for this class of applications as well. In

  11. Automotive suspension control through a computer communication network

    Microsoft Academic Search

    U. Ozguner; H. Goktas; H. Chant; J. Winkelman; M. Liubakka; R. Krtolica

    1992-01-01

    Closed-loop stability and performance-related studies performed on a multiplex communication network called Carlink, being considered for automotive applications, are discussed. Tests done on an automotive suspension control model, in which the active control signal is applied through the multiplex network as a real-time hybrid computer\\/hardware-in-the-loop experiment are outlined. The stability of the system is considered using analytical approaches developed by

  12. Social Networking to Support Collaboration in Computational Grids

    Microsoft Academic Search

    Oscar Ardaiz; Isaac Chao; Ramón Sangüesa

    2007-01-01

    Grids are complex systems that aggregate large amounts of distributed computational resources to perform large scale simulations\\u000a and analysis by multiple research groups. In this paper we unveil its social networks: actors that participate in a Grid and\\u000a relationships among those Grid actors. Social networking information can be used as a means to increase awareness and to facilitate\\u000a collaboration among

  13. Connectomic constraints on computation in feedforward networks of spiking neurons.

    PubMed

    Ramaswamy, Venkatakrishnan; Banerjee, Arunava

    2014-10-01

    Several efforts are currently underway to decipher the connectome or parts thereof in a variety of organisms. Ascertaining the detailed physiological properties of all the neurons in these connectomes, however, is out of the scope of such projects. It is therefore unclear to what extent knowledge of the connectome alone will advance a mechanistic understanding of computation occurring in these neural circuits, especially when the high-level function of the said circuit is unknown. We consider, here, the question of how the wiring diagram of neurons imposes constraints on what neural circuits can compute, when we cannot assume detailed information on the physiological response properties of the neurons. We call such constraints-that arise by virtue of the connectome-connectomic constraints on computation. For feedforward networks equipped with neurons that obey a deterministic spiking neuron model which satisfies a small number of properties, we ask if just by knowing the architecture of a network, we can rule out computations that it could be doing, no matter what response properties each of its neurons may have. We show results of this form, for certain classes of network architectures. On the other hand, we also prove that with the limited set of properties assumed for our model neurons, there are fundamental limits to the constraints imposed by network structure. Thus, our theory suggests that while connectomic constraints might restrict the computational ability of certain classes of network architectures, we may require more elaborate information on the properties of neurons in the network, before we can discern such results for other classes of networks. PMID:24691897

  14. Internet Web-based Course Delivery: Experiences from Both Sides of the Computer.

    ERIC Educational Resources Information Center

    Hudson, Larry; Kubala, Tom; Paugh, Robert; Truman, Barbara; Bayston, Tom; Ramos, Rafael; Torino, Damian; Kraushaar, David E.; McAdoo, Barbara; Bloethner, Craig

    1997-01-01

    Presents perspectives of teaching and learning via Internet-based courses. The courses discussed use the Web as a delivery system, not as the primary content. Describes courses offered and course organization; instructors' perspectives--from traditional distance education teaching to Web-based teaching; the role of Web consultants; and student…

  15. Hazard Communication Project: computer-based training course (for microcomputers). Software

    SciTech Connect

    Fisher, S.

    1989-03-01

    The software is computer-based training with the following course objectives: to inform employees of their employer's requirements under the OSHA Hazard Communication Standard (29 CFR 1910.1200); to instruct employees on the procedures for obtaining and using information on hazardous materials, including understanding labeling systems and understanding the material safety data sheet (MSDS) information; to provide information on 11 classes of chemicals, including their common uses, potential physical and health hazards, detection methods, and safety measures to follow. There are 14 lessons, ranging in length from 30 minutes to 1 (one) hour. Software Description: The software is written in the UNISON language for use on an IBM PC or compatible machines using MS DOS operating system. It requires 378K of memory. Special requirements are an EGA graphics card and monitor. The program will not run on monochrome or CGA systems.

  16. Computer integration: a co-requirement for effective inter-organization computer network implementation

    Microsoft Academic Search

    Paul Hart; Deborah Estrin

    1990-01-01

    Inter-organization computer networks (IONS) provide significant opportunities for improving coordination between firms engaged in mutually dependent activities. This research paper focuses on how IONS affect information processing requirements, and production and transaction costs when they interconnect firms with internally integrated computer systems and when they are used only as substitutes for conventional media. We conclude that significant improvements in inter-

  17. Analytical Computation of the Epidemic Threshold on Temporal Networks

    NASA Astrophysics Data System (ADS)

    Valdano, Eugenio; Ferreri, Luca; Poletto, Chiara; Colizza, Vittoria

    2015-04-01

    The time variation of contacts in a networked system may fundamentally alter the properties of spreading processes and affect the condition for large-scale propagation, as encoded in the epidemic threshold. Despite the great interest in the problem for the physics, applied mathematics, computer science, and epidemiology communities, a full theoretical understanding is still missing and currently limited to the cases where the time-scale separation holds between spreading and network dynamics or to specific temporal network models. We consider a Markov chain description of the susceptible-infectious-susceptible process on an arbitrary temporal network. By adopting a multilayer perspective, we develop a general analytical derivation of the epidemic threshold in terms of the spectral radius of a matrix that encodes both network structure and disease dynamics. The accuracy of the approach is confirmed on a set of temporal models and empirical networks and against numerical results. In addition, we explore how the threshold changes when varying the overall time of observation of the temporal network, so as to provide insights on the optimal time window for data collection of empirical temporal networked systems. Our framework is of both fundamental and practical interest, as it offers novel understanding of the interplay between temporal networks and spreading dynamics.

  18. Navigating Traditional Chinese Medicine Network Pharmacology and Computational Tools

    PubMed Central

    Chen, Jia-Lei; Xu, Li-Wen

    2013-01-01

    The concept of “network target” has ushered in a new era in the field of traditional Chinese medicine (TCM). As a new research approach, network pharmacology is based on the analysis of network models and systems biology. Taking advantage of advancements in systems biology, a high degree of integration data analysis strategy and interpretable visualization provides deeper insights into the underlying mechanisms of TCM theories, including the principles of herb combination, biological foundations of herb or herbal formulae action, and molecular basis of TCM syndromes. In this study, we review several recent developments in TCM network pharmacology research and discuss their potential for bridging the gap between traditional and modern medicine. We briefly summarize the two main functional applications of TCM network models: understanding/uncovering and predicting/discovering. In particular, we focus on how TCM network pharmacology research is conducted and highlight different computational tools, such as network-based and machine learning algorithms, and sources that have been proposed and applied to the different steps involved in the research process. To make network pharmacology research commonplace, some basic network definitions and analysis methods are presented. PMID:23983798

  19. Computational approach in estimating the need of ditch network maintenance

    NASA Astrophysics Data System (ADS)

    Lauren, Ari; Hökkä, Hannu; Launiainen, Samuli; Palviainen, Marjo; Repo, Tapani; Leena, Finer; Piirainen, Sirpa

    2015-04-01

    Ditch network maintenance (DNM), implemented annually in 70 000 ha area in Finland, is the most controversial of all forest management practices. Nationwide, it is estimated to increase the forest growth by 1…3 million m3 per year, but simultaneously to cause 65 000 tons export of suspended solids and 71 tons of phosphorus (P) to water courses. A systematic approach that allows simultaneous quantification of the positive and negative effects of DNM is required. Excess water in the rooting zone slows the gas exchange and decreases biological activity interfering with the forest growth in boreal forested peatlands. DNM is needed when: 1) the excess water in the rooting zone restricts the forest growth before the DNM, and 2) after the DNM the growth restriction ceases or decreases, and 3) the benefits of DNM are greater than the caused adverse effects. Aeration in the rooting zone can be used as a drainage criterion. Aeration is affected by several factors such as meteorological conditions, tree stand properties, hydraulic properties of peat, ditch depth, and ditch spacing. We developed a 2-dimensional DNM simulator that allows the user to adjust these factors and to evaluate their effect on the soil aeration at different distance from the drainage ditch. DNM simulator computes hydrological processes and soil aeration along a water flowpath between two ditches. Applying daily time step it calculates evapotranspiration, snow accumulation and melt, infiltration, soil water storage, ground water level, soil water content, air-filled porosity and runoff. The model performance in hydrology has been tested against independent high frequency field monitoring data. Soil aeration at different distance from the ditch is computed under steady-state assumption using an empirical oxygen consumption model, simulated air-filled porosity, and diffusion coefficient at different depths in soil. Aeration is adequate and forest growth rate is not limited by poor aeration if the computed oxygen concentration under the rooting zone is > 0. In other case, the forest growth rate is scaled down with a proportion of the realized oxygen flux and the potential oxygen consumption. The growth limitation coefficient is integrated over the area between the ditches and over the simulation time. The growth limitation approach is being validated against field measured data. Concentration of suspended solids and phosphorus in runoff water are derived from empirical equations. The export load is computed by multiplying the daily concentration with the simulated runoff. The concentration of suspended solids depends on the texture of soil, and the time elapsed from the DNM, and the P concentration depends on the prevailing ground water level. The export loads are integrated over the simulation time. The computational evaluation of the benefits and the adverse effects of DNM allow us to locate DNM activities to suitable sites and to avoid it on other sites. The simulator allows a systematic optimization of DNM activity.

  20. Quantum computer networks with the orbital angular momentum of light

    NASA Astrophysics Data System (ADS)

    Garcia-Escartin, Juan Carlos; Chamorro-Posada, Pedro

    2012-09-01

    Inside computer networks, different information processing tasks are necessary to deliver the user data efficiently. This processing can also be done in the quantum domain. We present simple optical quantum networks where the orbital angular momentum (OAM) of a single photon is used as an ancillary degree of freedom which controls decisions at the network level. Linear optical elements are enough to provide important network primitives such as multiplexing and routing. First we show how to build a simple multiplexer and demultiplexer which combine photonic qubits and separate them again at the receiver. We also give two different self-routing networks where the OAM of an input photon is enough to make it find its desired destination.

  1. Small-world networks in neuronal populations: a computational perspective.

    PubMed

    Zippo, Antonio G; Gelsomino, Giuliana; Van Duin, Pieter; Nencini, Sara; Caramenti, Gian Carlo; Valente, Maurizio; Biella, Gabriele E M

    2013-08-01

    The analysis of the brain in terms of integrated neural networks may offer insights on the reciprocal relation between structure and information processing. Even with inherent technical limits, many studies acknowledge neuron spatial arrangements and communication modes as key factors. In this perspective, we investigated the functional organization of neuronal networks by explicitly assuming a specific functional topology, the small-world network. We developed two different computational approaches. Firstly, we asked whether neuronal populations actually express small-world properties during a definite task, such as a learning task. For this purpose we developed the Inductive Conceptual Network (ICN), which is a hierarchical bio-inspired spiking network, capable of learning invariant patterns by using variable-order Markov models implemented in its nodes. As a result, we actually observed small-world topologies during learning in the ICN. Speculating that the expression of small-world networks is not solely related to learning tasks, we then built a de facto network assuming that the information processing in the brain may occur through functional small-world topologies. In this de facto network, synchronous spikes reflected functional small-world network dependencies. In order to verify the consistency of the assumption, we tested the null-hypothesis by replacing the small-world networks with random networks. As a result, only small world networks exhibited functional biomimetic characteristics such as timing and rate codes, conventional coding strategies and neuronal avalanches, which are cascades of bursting activities with a power-law distribution. Our results suggest that small-world functional configurations are liable to underpin brain information processing at neuronal level. PMID:23632438

  2. Computing in Social Networks$,$$ Andrei Giurgiua

    E-print Network

    Paris-Sud XI, Université de

    is a dedicated overlay structure that enables secret sharing and distributed verifications which leverage is still growing by the day, e.g., Facebook boasts by now more than 400 millions users. These networks, this poses several privacy problems, besides scalability. For instance, there is no guarantee that Facebook

  3. Computer program for compressible flow network analysis

    NASA Technical Reports Server (NTRS)

    Wilton, M. E.; Murtaugh, J. P.

    1973-01-01

    Program solves problem of an arbitrarily connected one dimensional compressible flow network with pumping in the channels and momentum balancing at flow junctions. Program includes pressure drop calculations for impingement flow and flow through pin fin arrangements, as currently found in many air cooled turbine bucket and vane cooling configurations.

  4. Reputation-Based Systems within Computer Networks

    Microsoft Academic Search

    Malohat Ibrohimovna; Sonia Heemstra de Groot

    2010-01-01

    The topic on using reputation has received considerable research attention in the field of networking and communications. In this survey paper, we discuss the various ways the systems can benefit from using reputation information. We provide the examples of existing reputation-based systems discussing their functional implementations. Based on our observations, we list minimum requirements for benefiting from reputation-based systems in

  5. Properties of sparse penalties on inferring gene regulatory networks from time-course gene expression data.

    PubMed

    Liu, Li-Zhi; Wu, Fang-Xiang; Zhang, Wen-Jun

    2015-02-01

    Genes regulate each other and form a gene regulatory network (GRN) to realise biological functions. Elucidating GRN from experimental data remains a challenging problem in systems biology. Numerous techniques have been developed and sparse linear regression methods become a promising approach to infer accurate GRNs. However, most linear methods are either based on steady-state gene expression data or their statistical properties are not analysed. Here, two sparse penalties, adaptive least absolute shrinkage and selection operator and smoothly clipped absolute deviation, are proposed to infer GRNs from time-course gene expression data based on an auto-regressive model and their Oracle properties are proved under mild conditions. The effectiveness of those methods is demonstrated by applications to in silico and real biological data. PMID:25569860

  6. Propagation of computer virus both across the Internet and external computers: A complex-network approach

    NASA Astrophysics Data System (ADS)

    Gan, Chenquan; Yang, Xiaofan; Liu, Wanping; Zhu, Qingyi; Jin, Jian; He, Li

    2014-08-01

    Based on the assumption that external computers (particularly, infected external computers) are connected to the Internet, and by considering the influence of the Internet topology on computer virus spreading, this paper establishes a novel computer virus propagation model with a complex-network approach. This model possesses a unique (viral) equilibrium which is globally attractive. Some numerical simulations are also given to illustrate this result. Further study shows that the computers with higher node degrees are more susceptible to infection than those with lower node degrees. In this regard, some appropriate protective measures are suggested.

  7. TCPNET: a computer program to analyze thermochemical pipeline networks

    SciTech Connect

    Berkowitz, B.J.; Hutchins, B.A.

    1982-05-01

    The computer program TCPNET is a tool for the analysis of thermochemical pipeline (TCP) applications of the high-temperature gas reactor (HTGR) to specific industrial areas. The product considered is industrial process heat, in the form of steam and/or direct heat, which is geographically distributed to a large number of individual-plant users. The TCPNET computer program is designed to analyze the thermochemical pipeline network and associated methanators for a realistic distribution of potential industrial users.

  8. CIS 6370 COMPUTER DATA SECURITY President Obama has declared computer network warfare to be one of the highest

    E-print Network

    Richman, Fred

    CIS 6370 COMPUTER DATA SECURITY President Obama has declared computer network warfare to be one write reports to those who can find the flaws, see the attacks, and secure the networks. Security as basic knowledge of object-oriented design. Overview of technical aspects of data and network security

  9. Performance Evaluation in Network-Based Parallel Computing

    NASA Technical Reports Server (NTRS)

    Dezhgosha, Kamyar

    1996-01-01

    Network-based parallel computing is emerging as a cost-effective alternative for solving many problems which require use of supercomputers or massively parallel computers. The primary objective of this project has been to conduct experimental research on performance evaluation for clustered parallel computing. First, a testbed was established by augmenting our existing SUNSPARCs' network with PVM (Parallel Virtual Machine) which is a software system for linking clusters of machines. Second, a set of three basic applications were selected. The applications consist of a parallel search, a parallel sort, a parallel matrix multiplication. These application programs were implemented in C programming language under PVM. Third, we conducted performance evaluation under various configurations and problem sizes. Alternative parallel computing models and workload allocations for application programs were explored. The performance metric was limited to elapsed time or response time which in the context of parallel computing can be expressed in terms of speedup. The results reveal that the overhead of communication latency between processes in many cases is the restricting factor to performance. That is, coarse-grain parallelism which requires less frequent communication between processes will result in higher performance in network-based computing. Finally, we are in the final stages of installing an Asynchronous Transfer Mode (ATM) switch and four ATM interfaces (each 155 Mbps) which will allow us to extend our study to newer applications, performance metrics, and configurations.

  10. A Three-Dimensional Computational Model of Collagen Network Mechanics

    PubMed Central

    Lee, Byoungkoo; Zhou, Xin; Riching, Kristin; Eliceiri, Kevin W.; Keely, Patricia J.; Guelcher, Scott A.; Weaver, Alissa M.; Jiang, Yi

    2014-01-01

    Extracellular matrix (ECM) strongly influences cellular behaviors, including cell proliferation, adhesion, and particularly migration. In cancer, the rigidity of the stromal collagen environment is thought to control tumor aggressiveness, and collagen alignment has been linked to tumor cell invasion. While the mechanical properties of collagen at both the single fiber scale and the bulk gel scale are quite well studied, how the fiber network responds to local stress or deformation, both structurally and mechanically, is poorly understood. This intermediate scale knowledge is important to understanding cell-ECM interactions and is the focus of this study. We have developed a three-dimensional elastic collagen fiber network model (bead-and-spring model) and studied fiber network behaviors for various biophysical conditions: collagen density, crosslinker strength, crosslinker density, and fiber orientation (random vs. prealigned). We found the best-fit crosslinker parameter values using shear simulation tests in a small strain region. Using this calibrated collagen model, we simulated both shear and tensile tests in a large linear strain region for different network geometry conditions. The results suggest that network geometry is a key determinant of the mechanical properties of the fiber network. We further demonstrated how the fiber network structure and mechanics evolves with a local formation, mimicking the effect of pulling by a pseudopod during cell migration. Our computational fiber network model is a step toward a full biomechanical model of cellular behaviors in various ECM conditions. PMID:25386649

  11. Measures of effectiveness for BMD mid-course tracking on MIMD massively parallel computers

    SciTech Connect

    VanDyke, J.P.; Tomkins, J.L.; Furnish, M.D.

    1995-05-01

    The TRC code, a mid-course tracking code for ballistic missiles, has previously been implemented on a 1024-processor MIMD (Multiple Instruction -- Multiple Data) massively parallel computer. Measures of Effectiveness (MOE) for this algorithm have been developed for this computing environment. The MOE code is run in parallel with the TRC code. Particularly useful MOEs include the number of missed objects (real objects for which the TRC algorithm did not construct a track); of ghost tracks (tracks not corresponding to a real object); of redundant tracks (multiple tracks corresponding to a single real object); and of unresolved objects (multiple objects corresponding to a single track). All of these are expressed as a function of time, and tend to maximize during the time in which real objects are spawned (multiple reentry vehicles per post-boost vehicle). As well, it is possible to measure the track-truth separation as a function of time. A set of calculations is presented illustrating these MOEs as a function of time for a case with 99 post-boost vehicles, each of which spawns 9 reentry vehicles.

  12. A computational study of routing algorithms for realistic transportation networks

    SciTech Connect

    Jacob, R.; Marathe, M.V.; Nagel, K.

    1998-12-01

    The authors carry out an experimental analysis of a number of shortest path (routing) algorithms investigated in the context of the TRANSIMS (Transportation Analysis and Simulation System) project. The main focus of the paper is to study how various heuristic and exact solutions, associated data structures affected the computational performance of the software developed especially for realistic transportation networks. For this purpose the authors have used Dallas Fort-Worth road network with very high degree of resolution. The following general results are obtained: (1) they discuss and experimentally analyze various one-one shortest path algorithms, which include classical exact algorithms studied in the literature as well as heuristic solutions that are designed to take into account the geometric structure of the input instances; (2) they describe a number of extensions to the basic shortest path algorithm. These extensions were primarily motivated by practical problems arising in TRANSIMS and ITS (Intelligent Transportation Systems) related technologies. Extensions discussed include--(i) time dependent networks, (ii) multi-modal networks, (iii) networks with public transportation and associated schedules. Computational results are provided to empirically compare the efficiency of various algorithms. The studies indicate that a modified Dijkstra`s algorithm is computationally fast and an excellent candidate for use in various transportation planning applications as well as ITS related technologies.

  13. A RECONFIGURABLE COMPUTING ARCHITECTURE FOR IMPLEMENTING ARTIFICIAL NEURAL NETWORKS ON FPGA

    E-print Network

    Areibi, Shawki M

    A RECONFIGURABLE COMPUTING ARCHITECTURE FOR IMPLEMENTING ARTIFICIAL NEURAL NETWORKS ON FPGA Professor Shawki Areibi Artificial Neural Networks (ANNs), and the backpropagation algorithm in particular NEURAL NETWORKS ON FPGA Kristian Nichols University of Guelph, 2003 Advisor: Professor Medhat Moussa

  14. Identifying failure in a tree network of a parallel computer

    DOEpatents

    Archer, Charles J. (Rochester, MN); Pinnow, Kurt W. (Rochester, MN); Wallenfelt, Brian P. (Eden Prairie, MN)

    2010-08-24

    Methods, parallel computers, and products are provided for identifying failure in a tree network of a parallel computer. The parallel computer includes one or more processing sets including an I/O node and a plurality of compute nodes. For each processing set embodiments include selecting a set of test compute nodes, the test compute nodes being a subset of the compute nodes of the processing set; measuring the performance of the I/O node of the processing set; measuring the performance of the selected set of test compute nodes; calculating a current test value in dependence upon the measured performance of the I/O node of the processing set, the measured performance of the set of test compute nodes, and a predetermined value for I/O node performance; and comparing the current test value with a predetermined tree performance threshold. If the current test value is below the predetermined tree performance threshold, embodiments include selecting another set of test compute nodes. If the current test value is not below the predetermined tree performance threshold, embodiments include selecting from the test compute nodes one or more potential problem nodes and testing individually potential problem nodes and links to potential problem nodes.

  15. aiVIS Artificial Immune Network Visualisation Computing Laboratory

    E-print Network

    Kent, University of

    The field of Artificial Immune Systems (AIS) is the use of the natural immune system as a metaphor: immune networks, self organising maps, exploratory data analysis, artificial immune systems, cluster to Computer Scientists (Paton, 1994). Recently, increased use has been made of the natural immune system

  16. Computer program for network synthesis by frequency response fit

    NASA Technical Reports Server (NTRS)

    Green, S.

    1967-01-01

    Computer program synthesizes a passive network by minimizing the difference in desired and actual frequency response. The program solves for the critical points of the error function /weighted least squares fit between calculated and desired frequency response/ by the multivariable Newton-Raphson method with components constrained to an admissible region.

  17. Network based high performance concurrent computing. Progress report, [FY 1991

    SciTech Connect

    Sunderam, V.S.

    1991-12-31

    The overall objectives of this project are to investigate research issues pertaining to programming tools and efficiency issues in network based concurrent computing systems. The basis for these efforts is the PVM project that evolved during my visits to Oak Ridge Laboratories under the DOE Faculty Research Participation program; I continue to collaborate with researchers at Oak Ridge on some portions of the project.

  18. Business Computer Network--A "Gateway" to Multiple Databanks.

    ERIC Educational Resources Information Center

    O'Leary, Mick

    1985-01-01

    Business Computer Network (BCN) employs automatic calling and logon, multiple database access, disk search capture, and search assistance interfaces to provide single access to 15 online services. Telecommunications software (SuperScout) used to reach BCN and participating online services offers storage and message options and is accompanied by…

  19. Using encryption for authentication in large networks of computers

    Microsoft Academic Search

    Roger M. Needham; Michael D. Schroeder

    1978-01-01

    Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.

  20. New Trends and Challenges in Computer Network Security

    E-print Network

    Sandhu, Ravi

    -Leading Research with Real-World Impact! Institute for Cyber Security #12;2 Major Cyber Drivers # 1 Technology: reducing Social: increasing © Ravi Sandhu World-Leading Research with Real-World Impact! #12;3 Major Cyber1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed

  1. A Taxonomy of Biologically Inspired Research in Computer Networking

    Microsoft Academic Search

    Michael Meisel; Vasileios Pappas; Lixia Zhang

    The natural world is enormous, dynamic, incredibly diverse, and highly complex. Despite the inherent challenges of surviving in such a world, biological organisms evolve, self-organize, self-repair, navigate, and ourish. Generally, they do so with only local knowledge and without any centralized control. Our computer networks are increasingly facing similar challenges as they grow larger in size, but are yet to

  2. A Network Flow Computation for Project Cost Curves

    Microsoft Academic Search

    D. R. Fulkerson

    1961-01-01

    A network flow method is outlined for solving the linear programming problem of computing the least cost curve for a project composed of many individual jobs, where it is assumed that certain jobs must be finished before others can be started. Each job has an associated crash completion time and normal completion time, and the cost of doing the job

  3. Inter-organization computer networks: indications of shifts in interdependence

    Microsoft Academic Search

    Paul Hart; D. Estrin

    1990-01-01

    As firms increasingly adopt inter-organization computer networks (IONs) to improve coordination, researchers must be concerned about the long term impact of IONs on organizational relationships. This paper reports on an exploratory study of the use of IONs in design and manufacturing activities in the semiconductor industry. We identify the potential interactions between firms that can be facilitated by IONs, and

  4. Tracking liquid helium production, distribution, and consumption by networked computer

    Microsoft Academic Search

    Larry Frederick; Greg Labbe; Gary G Ihas

    2000-01-01

    A computer-networked liquid and gaseous helium monitoring system has been utilized in a university campus-wide operation. High efficiency is achieved by minimizing wasted production, excess storage, and lost gas. The system, its components, and operation is described.

  5. Secure Cloud Computing with a Virtualized Network Infrastructure

    E-print Network

    Akella, Aditya

    Secure Cloud Computing with a Virtualized Network Infrastructure Fang Hao, T.V. Lakshman, Sarit the rapid development in the field of cloud com- puting, security is still one of the major hurdles to cloud to users. At the other end of the spectrum, highly secured cloud services (e.g. Google "government cloud

  6. Precision Synchronization of Computer Network Clocks 1,2,3

    Microsoft Academic Search

    David L. Mills

    This paper builds on previous work involving the Network Time Protocol, which is used to synchronize computer clocks in the Internet. It describes a series of incremental improvements in system hardware and software which result in significantly better accuracy and stability, especially in primary time servers directly synchronized to radio or satellite time services. These improvements include novel interfacing techniques

  7. CPS 472/572: Computer Networking Spring 1997

    E-print Network

    Clark, Russell J.

    that is a duplicate or group result will receive a zero grade. 4. Makeup exams will only be given in the case of programming using C on a UNIX system will be required for homework projects. Materials Text: Data Communications, Computer Networks and Open Systems by Fred Halsall, Fourth Edition Text: Internetworking with TCP

  8. The Polling Primitive for Computer Networks A. Czygrinow

    E-print Network

    Czygrinow, Andrzej

    of synchronization and communication in distributed or con- current systems. The polling operation involves networks. Time and message lower bounds are presented, and it followed by an analysis of the number of op machines. Status or resource monitoring, fully replicated queries or updates, the computation of multiple

  9. An Analysis of Attitudes toward Computer Networks and Internet Addiction.

    ERIC Educational Resources Information Center

    Tsai, Chin-Chung; Lin, Sunny S. J.

    The purpose of this study was to explore the interplay between young people's attitudes toward computer networks and Internet addiction. After analyzing questionnaire responses of an initial sample of 615 Taiwanese high school students, 78 subjects, viewed as possible Internet addicts, were selected for further explorations. It was found that…

  10. Anonymous Communications he ubiquity of networked computers has made

    E-print Network

    Anonymous Communications T he ubiquity of networked computers has made increasing amounts of user, thenanonymityofcommunicationisitsbedrock--with- out anonymous communication, cryptography-based privacy would be very weak indeed. Every message has two anonymity sets--groups of identities assigned to the message's sender or receiver to help

  11. Evolving Cellular Automata for Location Management in Mobile Computing Networks

    E-print Network

    Ha, Dong S.

    entering one of these reporting cells. To create such an evolving CA system, cells in the network for a number of test problems. Index Terms--Cellular automata, genetic algorithms, mobile computing, mobility to interferences. On the other hand, a miss on the location of a mobile terminal will necessitate a search

  12. Compulsory courses Concept courses

    E-print Network

    -0309-00 Concepts in Modern Genetics 6 Master courses Autumn semester 529-0733-00 Enzymes 7 529-0041-00 Moderne of Metabolism 4 636-0007-00 Computational Systems Biology 4 401-0649-00 Applied Statistical Regression 4 636 to Bioinformatics: Concepts and Application 6 529-0732-00 Proteins and Lipids 6 529-0731-00 Nucleic Acids

  13. Computational Neuropsychiatry – Schizophrenia as a Cognitive Brain Network Disorder

    PubMed Central

    Dauvermann, Maria R.; Whalley, Heather C.; Schmidt, André; Lee, Graham L.; Romaniuk, Liana; Roberts, Neil; Johnstone, Eve C.; Lawrie, Stephen M.; Moorhead, Thomas W. J.

    2014-01-01

    Computational modeling of functional brain networks in fMRI data has advanced the understanding of higher cognitive function. It is hypothesized that functional networks mediating higher cognitive processes are disrupted in people with schizophrenia. In this article, we review studies that applied measures of functional and effective connectivity to fMRI data during cognitive tasks, in particular working memory fMRI studies. We provide a conceptual summary of the main findings in fMRI data and their relationship with neurotransmitter systems, which are known to be altered in individuals with schizophrenia. We consider possible developments in computational neuropsychiatry, which are likely to further our understanding of how key functional networks are altered in schizophrenia. PMID:24723894

  14. Computational neuropsychiatry - schizophrenia as a cognitive brain network disorder.

    PubMed

    Dauvermann, Maria R; Whalley, Heather C; Schmidt, André; Lee, Graham L; Romaniuk, Liana; Roberts, Neil; Johnstone, Eve C; Lawrie, Stephen M; Moorhead, Thomas W J

    2014-01-01

    Computational modeling of functional brain networks in fMRI data has advanced the understanding of higher cognitive function. It is hypothesized that functional networks mediating higher cognitive processes are disrupted in people with schizophrenia. In this article, we review studies that applied measures of functional and effective connectivity to fMRI data during cognitive tasks, in particular working memory fMRI studies. We provide a conceptual summary of the main findings in fMRI data and their relationship with neurotransmitter systems, which are known to be altered in individuals with schizophrenia. We consider possible developments in computational neuropsychiatry, which are likely to further our understanding of how key functional networks are altered in schizophrenia. PMID:24723894

  15. Network architecture test-beds as platforms for ubiquitous computing.

    PubMed

    Roscoe, Timothy

    2008-10-28

    Distributed systems research, and in particular ubiquitous computing, has traditionally assumed the Internet as a basic underlying communications substrate. Recently, however, the networking research community has come to question the fundamental design or 'architecture' of the Internet. This has been led by two observations: first, that the Internet as it stands is now almost impossible to evolve to support new functionality; and second, that modern applications of all kinds now use the Internet rather differently, and frequently implement their own 'overlay' networks above it to work around its perceived deficiencies. In this paper, I discuss recent academic projects to allow disruptive change to the Internet architecture, and also outline a radically different view of networking for ubiquitous computing that such proposals might facilitate. PMID:18672453

  16. Computational methods for a class of network models.

    PubMed

    Wang, Junshan; Jasra, Ajay; De Iorio, Maria

    2014-02-01

    In the following article, we provide an exposition of exact computational methods to perform parameter inference from partially observed network models. In particular, we consider the duplication attachment model that has a likelihood function that typically cannot be evaluated in any reasonable computational time. We consider a number of importance sampling (IS) and sequential Monte Carlo (SMC) methods for approximating the likelihood of the network model for a fixed parameter value. It is well-known that, for IS, the relative variance of the likelihood estimate typically grows at an exponential rate in the time parameter (here this is associated with the size of the network); we prove that, under assumptions, the SMC method will have relative variance that can grow only polynomially. In order to perform parameter estimation, we develop particle Markov chain Monte Carlo algorithms to perform Bayesian inference. Such algorithms use the aforementioned SMC algorithms within the transition dynamics. The approaches are illustrated numerically. PMID:24144112

  17. A replicated experiment of pair-programming in a 2nd-year software development and design computer science course

    Microsoft Academic Search

    Emilia Mendes; Lubna Basil Al-fakhri; Andrew Luxton-reilly

    2006-01-01

    This paper presents the results of a replicated pair programming experiment conducted at the University of Auckland (NZ) during the first semester of 2005. It involved 190 second year Computer Science students attending a software design and construction course. We replicated the experiment described in (18), investigating similar issues to those reported in (32) and employing a subset of the

  18. Investigating pair-programming in a 2nd-year software development and design computer science course

    Microsoft Academic Search

    Emilia Mendes; Lubna Basil Al-Fakhri; Andrew Luxton-Reilly

    2005-01-01

    This paper presents the results of a pair programming experiment conducted at the University of Auckland (NZ) during the first semester of 2004. It involved 300 second year Computer Science students attending a software design and construction course. We investigated similar issues to those reported in [26] and employed a subset of the questionnaires used by Laurie Williams et al.

  19. A Computer-Assisted Instruction Course on Laboratory Detection of Malarial Parasites in Human Blood. Interim Report.

    ERIC Educational Resources Information Center

    Mitzel, Harold E.

    In cooperation with the United States Navy, this project was undertaken to examine the feasibility of computer assisted instruction in clinical malaria recognition, to train a small group of Naval personnel in techniques of creating and presenting such material, and to evaluate the course by giving it to a representative sample of Naval medical…

  20. Development, Implementation, and Cost-Assessment of an Integrated Computer-Assisted Instruction Course on Drug Interactions.

    ERIC Educational Resources Information Center

    Narducci, Warren A.

    1985-01-01

    A study of the feasibility of using integrated, computer-assisted instruction in a drug interaction course revealed that despite the high initial time and financial investment, the potential educational benefits and high student acceptance of the instruction supports its application in other curriculum areas. (MSE)

  1. Comparison of Self-Perceptions of Computer Literacy and Skills Proficiency Assessment of College Students in Entry Level Technology Courses

    ERIC Educational Resources Information Center

    Cammack, Nancy

    2008-01-01

    This study was designed to compare perceived computer literacy with skills proficiency assessment of given skill sets with a second purpose to investigate the impact of certain variables on perceptions and skills proficiency of students enrolled in an introductory college level technology course. Implementation of survey research and hands-on…

  2. Applying Web-Based Co-Regulated Learning to Develop Students' Learning and Involvement in a Blended Computing Course

    ERIC Educational Resources Information Center

    Tsai, Chia-Wen

    2015-01-01

    This research investigated, via quasi-experiments, the effects of web-based co-regulated learning (CRL) on developing students' computing skills. Two classes of 68 undergraduates in a one-semester course titled "Applied Information Technology: Data Processing" were chosen for this research. The first class (CRL group, n = 38) received…

  3. A Triangulated Study of Academic Language Needs of Iranian Students of Computer Engineering: Are the Courses on Track?

    ERIC Educational Resources Information Center

    Atai, Mahmood Reza; Shoja, Leila

    2011-01-01

    Even though English for Specific Academic Purposes (ESAP) courses constitute a significant part of the Iranian university curriculum, curriculum developers have generally developed the programs based on intuition. This study assessed the present and target situation academic language needs of undergraduate students of computer engineering. To this…

  4. Computer-Mediated Word-of-Mouth Communication: The Influence of Mixed Reviews on Student Perceptions of Instructors and Courses

    ERIC Educational Resources Information Center

    Edwards, Autumn; Edwards, Chad

    2013-01-01

    The purpose of this experiment was to test the influence of mixed reviews appearing as computer-mediated word-of-mouth communication (WOM) on student perceptions of instructors (attractiveness and credibility) and attitudes toward learning course content (affective learning and state motivation). Using the heuristic-systematic processing model, it…

  5. A quantum neural network computes its own relative phase

    NASA Astrophysics Data System (ADS)

    Behrman, Elizabeth

    2013-03-01

    Complete characterization of the state of a quantum system made up of subsystems requires determination of relative phase, because of interference effects between the subsystems. For a system of qubits used as a quantum computer this is especially vital, because the entanglement, which is the basis for the quantum advantage in computing, depends intricately on phase. We present here a first step towards that determination, in which we use a two-qubit quantum system as a quantum neural network, which is trained to compute and output its own relative phase.

  6. A quantum neural network computes its own relative phase

    E-print Network

    E. C. Behrman; J. E. Steck

    2013-01-13

    Complete characterization of the state of a quantum system made up of subsystems requires determination of relative phase, because of interference effects between the subsystems. For a system of qubits used as a quantum computer this is especially vital, because the entanglement, which is the basis for the quantum advantage in computing, depends intricately on phase. We present here a first step towards that determination, in which we use a two-qubit quantum system as a quantum neural network, which is trained to compute and output its own relative phase.

  7. A data mining course for computer science: primary sources and implementations

    Microsoft Academic Search

    David R. Musicant

    2006-01-01

    An undergraduate elective course in data mining provides a strong opportunity for students to learn research skills, practice data structures, and enhance their understanding of algorithms. I have developed a data mining course built around the idea of using research-level papers as the primary reading material for the course, and implementing data min- ing algorithms for the assignments. Such a

  8. Adaptive Computation over Dynamic and Heterogeneous Networks

    E-print Network

    Teresco, James D.

    differential equations. Fields as diverse as fluid dynamics, material science, biomechanics, and ecology make computational problems, arising in fields including fluid dynamics, material science, biomechanics, and ecology. Adaptiv- ity, where meshes and numerical methods are automatically adjusted to achieve spec- ified levels

  9. Computers and Networks Part I Jen Golbeck

    E-print Network

    Golbeck, Jennifer

    ­ California: 1/80 of a second (by optical fiber) ­ London: 1/4 of a second (by satellite) · For large files? · Processor speed measured in "clock cycles per second" · Bandwidth measured in "bits per second" · Convenient, ... ­ Store data back into memory #12;16 Today's Focus · Storing and moving around data ­ Within a computer

  10. The Missing Link: Putting the Network in Networked Cloud Computing

    Microsoft Academic Search

    Ilia Baldine; Yufeng Xin; Daniel Evans; Chris Heerman; Jeff Chase; Varun Marupadi; Aydan Yumerefendi

    The backbone of IT infrastructure is evolving towards a service-oriented model, in which distributed resources, ei- ther software or hardware, can be composed as a customized IT service on demand. In particular, cloud computing infrastructure services manage a shared \\

  11. Communication networks for autonomous mobile robot computer architectures and distributed real-time computing

    NASA Astrophysics Data System (ADS)

    Aras, Caglan Mehmet

    1993-12-01

    Communication networks play an increasingly important role in many areas of computing. This dissertation introduces an interprocessor communication network for mobile robot computer architectures and real-time communication networks for distributed real-time computing. In both cases, the objective of the research is to provide communication with very low delay. Mobile robot tasks such as collision avoidance and dynamic navigation change over time and exhibit a high degree of cooperation. The segmented bus is a reconfigurable interconnection network for intelligent mobile robot applications. The segmented bus employs a preemptive circuit-switched message transfer technique for low delay. For mobile robot applications, analysis suggests that message delays are lower on the segmented bus as compared to alternatives such as the multiple bus. Interactive real-time message streams are used in continuous media distributed sensing and command/control applications. These streams require low end-to-end delay bounds and zero-loss. This dissertation offers solutions to message-stream admission and low latency message transfers for interactive real-time message streams on communication networks. The proposed adaptive stream admission procedure is shown to admit more streams to a network than previous approaches. The proposed preemphasis cut-through data transfer mechanism reduces the minimum achievable end-to-end delay bound of a packet-switched network to values approaching circuit-switched techniques. To obtain low latencies on integrated broadband networks, the asynchronous transfer mode (ATM) must support bound-delay, zero-loss data transfers. A message-level delay control mechanism based on preemptive cut-through is presented. Hardware and software to implement message-level delay control are described results show a significant reduction in computation requirements when message-level delay control is used on ATM switch processors.

  12. Attack–norm separation for detecting attack-induced quality problems on computers and networks

    Microsoft Academic Search

    Nong Ye; Qiang Chen

    2007-01-01

    Cyber attacks on computer and network systems induce system quality and reliability problems, and present a significant threat to the computer and network systems that we are heavily dependent on. Cyber attack detection involves monitoring system data and detecting the attack-induced quality and reliability problems of computer and network systems caused by cyber attacks. Usually there are ongoing normal user

  13. Taiwan International Graduate Program (TIGP) Social Networks and Human-Centered Computing

    E-print Network

    Taiwan International Graduate Program (TIGP) Social Networks and Human-Centered Computing of the international graduate students. The TIGP Program on" Social Networks and Human-Centered Computing" The TIGP on Social Networks and Human-Centered Computing(SNHCC) is a new program established jointly by National

  14. Reduction of dynamical biochemical reactions networks in computational biology

    PubMed Central

    Radulescu, O.; Gorban, A. N.; Zinovyev, A.; Noel, V.

    2012-01-01

    Biochemical networks are used in computational biology, to model mechanistic details of systems involved in cell signaling, metabolism, and regulation of gene expression. Parametric and structural uncertainty, as well as combinatorial explosion are strong obstacles against analyzing the dynamics of large models of this type. Multiscaleness, an important property of these networks, can be used to get past some of these obstacles. Networks with many well separated time scales, can be reduced to simpler models, in a way that depends only on the orders of magnitude and not on the exact values of the kinetic parameters. The main idea used for such robust simplifications of networks is the concept of dominance among model elements, allowing hierarchical organization of these elements according to their effects on the network dynamics. This concept finds a natural formulation in tropical geometry. We revisit, in the light of these new ideas, the main approaches to model reduction of reaction networks, such as quasi-steady state (QSS) and quasi-equilibrium approximations (QE), and provide practical recipes for model reduction of linear and non-linear networks. We also discuss the application of model reduction to the problem of parameter identification, via backward pruning machine learning techniques. PMID:22833754

  15. Computation emerges from adaptive synchronization of networking neurons.

    PubMed

    Zanin, Massimiliano; Del Pozo, Francisco; Boccaletti, Stefano

    2011-01-01

    The activity of networking neurons is largely characterized by the alternation of synchronous and asynchronous spiking sequences. One of the most relevant challenges that scientists are facing today is, then, relating that evidence with the fundamental mechanisms through which the brain computes and processes information, as well as with the arousal (or progress) of a number of neurological illnesses. In other words, the problem is how to associate an organized dynamics of interacting neural assemblies to a computational task. Here we show that computation can be seen as a feature emerging from the collective dynamics of an ensemble of networking neurons, which interact by means of adaptive dynamical connections. Namely, by associating logical states to synchronous neuron's dynamics, we show how the usual Boolean logics can be fully recovered, and a universal Turing machine can be constructed. Furthermore, we show that, besides the static binary gates, a wider class of logical operations can be efficiently constructed as the fundamental computational elements interact within an adaptive network, each operation being represented by a specific motif. Our approach qualitatively differs from the past attempts to encode information and compute with complex systems, where computation was instead the consequence of the application of control loops enforcing a desired state into the specific system's dynamics. Being the result of an emergent process, the computation mechanism here described is not limited to a binary Boolean logic, but it can involve a much larger number of states. As such, our results can enlighten new concepts for the understanding of the real computing processes taking place in the brain. PMID:22073167

  16. EEL 6562 --Image Processing and Computer Vision http://www.wu.ece.ufl.edu/courses/eel6825s13/[1/8/2013 2:21:25 PM

    E-print Network

    Fang, Yuguang "Michael"

    EEL 6562 -- Image Processing and Computer Vision http://www.wu.ece.ufl.edu/courses/eel6825s13/[1/8/2013 2:21:25 PM] University of Florida Department of Electrical and Computer Engineering EEL 6825 to the students through a mixture of motivational applications and theory. Course Prerequisites EEL 3135 (Discrete

  17. Computing Tutte polynomials of contact networks in classrooms

    NASA Astrophysics Data System (ADS)

    Hincapié, Doracelly; Ospina, Juan

    2013-05-01

    Objective: The topological complexity of contact networks in classrooms and the potential transmission of an infectious disease were analyzed by sex and age. Methods: The Tutte polynomials, some topological properties and the number of spanning trees were used to algebraically compute the topological complexity. Computations were made with the Maple package GraphTheory. Published data of mutually reported social contacts within a classroom taken from primary school, consisting of children in the age ranges of 4-5, 7-8 and 10-11, were used. Results: The algebraic complexity of the Tutte polynomial and the probability of disease transmission increases with age. The contact networks are not bipartite graphs, gender segregation was observed especially in younger children. Conclusion: Tutte polynomials are tools to understand the topology of the contact networks and to derive numerical indexes of such topologies. It is possible to establish relationships between the Tutte polynomial of a given contact network and the potential transmission of an infectious disease within such network

  18. Smart photonic networks and computer security for image data

    NASA Astrophysics Data System (ADS)

    Campello, Jorge; Gill, John T.; Morf, Martin; Flynn, Michael J.

    1998-02-01

    Work reported here is part of a larger project on 'Smart Photonic Networks and Computer Security for Image Data', studying the interactions of coding and security, switching architecture simulations, and basic technologies. Coding and security: coding methods that are appropriate for data security in data fusion networks were investigated. These networks have several characteristics that distinguish them form other currently employed networks, such as Ethernet LANs or the Internet. The most significant characteristics are very high maximum data rates; predominance of image data; narrowcasting - transmission of data form one source to a designated set of receivers; data fusion - combining related data from several sources; simple sensor nodes with limited buffering. These characteristics affect both the lower level network design and the higher level coding methods.Data security encompasses privacy, integrity, reliability, and availability. Privacy, integrity, and reliability can be provided through encryption and coding for error detection and correction. Availability is primarily a network issue; network nodes must be protected against failure or routed around in the case of failure. One of the more promising techniques is the use of 'secret sharing'. We consider this method as a special case of our new space-time code diversity based algorithms for secure communication. These algorithms enable us to exploit parallelism and scalable multiplexing schemes to build photonic network architectures. A number of very high-speed switching and routing architectures and their relationships with very high performance processor architectures were studied. Indications are that routers for very high speed photonic networks can be designed using the very robust and distributed TCP/IP protocol, if suitable processor architecture support is available.

  19. Application of neural networks in computing multiobjective stochastic programming

    SciTech Connect

    Fan, T.; Yonghong, J.; Bingzheng, X.

    1994-12-31

    Neural Networks are recognized to be a useful way to solve some optimization problems. In this paper, we will present a neural computing procedure for multiobjective stochastic programming problems. I.M. Stancu-Minasian examined several models of multiobjective stochastic programming with some solving methods and their concrete application in economics. The main idea of our solution procedure is to transform the multiobjective stochastic programming to an equivalent scale optimization problem which will be solved by neural network. Some kind of transformation techniques are considered for which different circuit implementations will be given. In this paper, some other methods will be considered. Numerical work is provided to illustrate the procedure.

  20. Line-plane broadcasting in a data communications network of a parallel computer

    DOEpatents

    Archer, Charles J. (Rochester, MN); Berg, Jeremy E. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Smith, Brian E. (Rochester, MN)

    2010-11-23

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.