Science.gov

Sample records for computer networking courses

  1. Student Motivation in Computer Networking Courses

    ERIC Educational Resources Information Center

    Hsin, Wen-Jung

    2007-01-01

    This paper introduces several hands-on projects that have been used to motivate students in learning various computer networking concepts. These projects are shown to be very useful and applicable to the learners' daily tasks and activities such as emailing, Web browsing, and online shopping and banking, and lead to an unexpected byproduct,…

  2. Improving a Computer Networks Course Using the Partov Simulation Engine

    ERIC Educational Resources Information Center

    Momeni, B.; Kharrazi, M.

    2012-01-01

    Computer networks courses are hard to teach as there are many details in the protocols and techniques involved that are difficult to grasp. Employing programming assignments as part of the course helps students to obtain a better understanding and gain further insight into the theoretical lectures. In this paper, the Partov simulation engine and…

  3. Networking: A Necessary Component in a Computer-Literacy Course.

    ERIC Educational Resources Information Center

    Norales, Francisca O.

    1993-01-01

    Discusses factors to be considered when planning and implementing a local area network (LAN) for personal computers within a school or an organization. Topics addressed include reasons for networking, characteristics of LANs, organizing a LAN, workstations, disk servers, and file servers. (Contains six references.) (LRW)

  4. Innovation of laboratory exercises in course Distributed systems and computer networks

    NASA Astrophysics Data System (ADS)

    Souček, Pavel; Slavata, Oldřich; Holub, Jan

    2013-09-01

    This paper is focused on innovation of laboratory exercises in course Distributed Systems and Computer Networks. These exercises were introduced in November of 2012 and replaced older exercises in order to reflect real life applications.

  5. Software Assisted Syllabus Preparation for Computer Networks Courses

    ERIC Educational Resources Information Center

    Ercan, Tuncay; Sahin, Yasar Guneri

    2007-01-01

    Course descriptions prepared by the lecturers in the beginning of the academic year do not get any feed back from the students enrolled it. These syllabuses are not only used for the future semesters, but also used by the other lecturers without even making any changes. This causes a negative effect on the student education since many of the…

  6. Designing a Versatile Dedicated Computing Lab to Support Computer Network Courses: Insights from a Case Study

    ERIC Educational Resources Information Center

    Gercek, Gokhan; Saleem, Naveed

    2006-01-01

    Providing adequate computing lab support for Management Information Systems (MIS) and Computer Science (CS) programs is a perennial challenge for most academic institutions in the US and abroad. Factors, such as lack of physical space, budgetary constraints, conflicting needs of different courses, and rapid obsolescence of computing technology,

  7. Designing a Versatile Dedicated Computing Lab to Support Computer Network Courses: Insights from a Case Study

    ERIC Educational Resources Information Center

    Gercek, Gokhan; Saleem, Naveed

    2006-01-01

    Providing adequate computing lab support for Management Information Systems (MIS) and Computer Science (CS) programs is a perennial challenge for most academic institutions in the US and abroad. Factors, such as lack of physical space, budgetary constraints, conflicting needs of different courses, and rapid obsolescence of computing technology,…

  8. Motivating students' participation in a computer networks course by means of magic, drama and games.

    PubMed

    Hilas, Constantinos S; Politis, Anastasios

    2014-01-01

    The recent economic crisis has forced many universities to cut down expenses by packing students into large lecture groups. The problem with large auditoria is that they discourage dialogue between students and faculty and they burden participation. Adding to this, students in computer science courses usually find the field to be full of theoretical and technical concepts. Lack of understanding leads them to lose interest and / or motivation. Classroom experience shows that the lecturer could employ alternative teaching methods, especially for early-year undergraduate students, in order to grasp their interest and introduce basic concepts. This paper describes some of the approaches that may be used to keep students interested and make them feel comfortable as they comprehend basic concepts in computer networks. The lecturing procedure was enriched with games, magic tricks and dramatic representations. This approach was used experimentally for two semesters and the results were more than encouraging. PMID:25105085

  9. Computer ethics: A capstone course

    SciTech Connect

    Fisher, T.G.; Abunawass, A.M.

    1994-12-31

    This paper presents a capstone course on computer ethics required for all computer science majors in our program. The course was designed to encourage students to evaluate their own personal value systems in terms of the established values in computer science as represented by the ACM Code of Ethics. The structure, activities, and topics of the course as well as assessment of the students are presented. Observations on various course components and student evaluations of the course are also presented.

  10. Introduction to Computing Course Guide.

    ERIC Educational Resources Information Center

    Hawaii State Dept. of Education, Honolulu. Office of Instructional Services.

    Developed to aid intermediate-level teachers and principals in initiating and developing computer literacy programs for their students, this document is a guide for the development of a one-semester course--Introduction to Computing--for the seventh and eighth grades. The course is designed to provide opportunities for students to develop computer…

  11. Computational network

    SciTech Connect

    Graf, H.P.

    1990-02-13

    This patent describes a network for storing K vectors M{sub {ital i}}, where i is an index in the range 1 to K designates a particular vector, and each vector M{sub {ital i}} has components M{sub {ital ij}} where j is an index in the range 1 to L designates the component number of the vector, K and L being integers. It comprises: a decision network for developing at output ports of the decision network signals that indicate recognition of a degree of presence of the vectors within input signals appearing at input ports of the decision network; and an interconnection network having K input leads connected to the output ports and output leads connected to the input ports, and L network interface leads, where each of the network interface leads, i, is connected to each output lead of the interconnection network, j, through a connection C{sub {ital ij}} and to each input lead of the interconnection network j, through a connection C{prime}{sub {ital ij}}, and where the C{sub {ital ij}} and C{prime}{sub {ital ij}} connections are related only to components j of vector i from among the K vectors.

  12. A Model Computer Literacy Course.

    ERIC Educational Resources Information Center

    Orndorff, Joseph

    Designed to address the varied computer skill levels of college students, this proposed computer literacy course would be modular in format, with modules tailored to address various levels of expertise and permit individualized instruction. An introductory module would present both the history and future of computers and computing, followed by an…

  13. Computer networks.

    PubMed

    Wear, L L; Pinkert, J R

    1993-10-01

    We have looked at several aspects of networks in this article. As you read about networks, and use them, we hope our discussions will help you understand some of the associated concepts and terms. For instance, suppose someone describes an Ethernet installation as a bus topology LAN using the 1-persistent CSMA/CD protocol with horizontal cables on each floor connected by repeaters to a vertical cable backbone running from the basement to the roof. You now have seen what that description implies. To close this article, we ask you to refer back to Figure 1. Our sample network transfer from Marie to Lars was described as being accomplished through a number of layers or steps, most of which were transparent to the users. Building upon the material presented in this article, we can now give you a more detailed illustration of those layers. Figure 13 shows the seven layers in network model defined by the International Standards Organization, ISO: application, presentation, session, transport, network, data link, and physical. We do not have space here to discuss each layer in detail, but Figure 13 does give a typical operation that is done in each layer. PMID:10183955

  14. Resources for Computational Geophysics Courses

    NASA Astrophysics Data System (ADS)

    Keers, Henk; Rondenay, Stéphane; Harlap, Yaël.; Nordmo, Ivar

    2014-09-01

    An important skill that students in solid Earth physics need to acquire is the ability to write computer programs that can be used for the processing, analysis, and modeling of geophysical data and phenomena. Therefore, this skill (which we call "computational geophysics") is a core part of any undergraduate geophysics curriculum. In this Forum, we share our personal experience in teaching such a course.

  15. Conception of a course for professional training and education in the field of computer and mobile forensics, part III: network forensics and penetration testing

    NASA Astrophysics Data System (ADS)

    Kröger, Knut; Creutzburg, Reiner

    2014-02-01

    IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data make it necessary to further train the own employees in the field of network forensics and penetration testing. Motivated by these facts, this paper - a continuation of a paper of January 2012 [1], which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses the practical implementation important relationships of network forensic and penetration testing.

  16. Computer Literacy: Course Description [and] Computer Awareness: Module Syllabus.

    ERIC Educational Resources Information Center

    Kirkwood Community Coll., Cedar Rapids, IA.

    This course description outlines an independent-study computer awareness course for community college faculty that uses videotapes, computer-assisted instruction, and individual study modules. The outline includes the rationale for the course and the media to be used; time required to complete the course; the goals of the course; the topics…

  17. A Position on a Computer Literacy Course.

    ERIC Educational Resources Information Center

    Self, Charles C.

    A position is put forth on the appropriate content of a computer literacy course and the role of computer literacy in the community college. First, various definitions of computer literacy are examined, including the programming, computer awareness, and comprehensive approaches. Next, five essential components of a computer literacy course are…

  18. Hyperswitch Communication Network Computer

    NASA Technical Reports Server (NTRS)

    Peterson, John C.; Chow, Edward T.; Priel, Moshe; Upchurch, Edwin T.

    1993-01-01

    Hyperswitch Communications Network (HCN) computer is prototype multiple-processor computer being developed. Incorporates improved version of hyperswitch communication network described in "Hyperswitch Network For Hypercube Computer" (NPO-16905). Designed to support high-level software and expansion of itself. HCN computer is message-passing, multiple-instruction/multiple-data computer offering significant advantages over older single-processor and bus-based multiple-processor computers, with respect to price/performance ratio, reliability, availability, and manufacturing. Design of HCN operating-system software provides flexible computing environment accommodating both parallel and distributed processing. Also achieves balance among following competing factors; performance in processing and communications, ease of use, and tolerance of (and recovery from) faults.

  19. Microcomputer Networks for Introductory Computer Science.

    ERIC Educational Resources Information Center

    Magel, Kenneth I.; Hamblen, John W.

    1979-01-01

    Describes a course that uses a network of microcomputers to teach students machine language and assembler programing. The course is intended to teach what the computer can do and what its limitations are, understandings that are often obscured when students work in high-level programing languages. (Author/IRT)

  20. Computers, Networks and Education.

    ERIC Educational Resources Information Center

    Kay, Alan C.

    1991-01-01

    Discussed is how globally networked, easy-to-use computers can enhance learning only within an educational environment that encourages students to question "facts" and seek challenges. The strengths and weaknesses of computers used as amplifiers for learning are described. (KR)

  1. Gateways among Academic Computer Networks.

    ERIC Educational Resources Information Center

    McCredie, John W.

    National intercampus computer networks are discussed, along with six illustrative networks. Attention is focused on computer networks with significant academic usage through which special software is available to manage resources in the network. It is noted that computer networks have widespread use among academics for communication in the form of…

  2. Computing in College Courses: The Dartmouth Experience.

    ERIC Educational Resources Information Center

    Cohen, Peter A.

    In order to assess faculty and student use of, and attitudes toward, instructional computing at Dartmouth College, faculty members and students were surveyed during the spring of 1981 to determine how computing was being used in Dartmouth courses. Each of the 450 faculty members who taught an on-campus course from summer 1980 through spring 1981…

  3. Educational Computing Course. [SITE 2001 Section].

    ERIC Educational Resources Information Center

    Bump, Wren, Ed.

    This document contains the following papers on the educational computing course from the SITE (Society for Information Technology & Teacher Education) 2001 conference: "Using a Flexible Format To Create a Constructivist Learning Environment in the Educational Computing Course" (Wren M. Bump); "Technological Diversity: Managing Differing Technology…

  4. Computer Network Resources for Physical Geography Instruction.

    ERIC Educational Resources Information Center

    Bishop, Michael P.; And Others

    1993-01-01

    Asserts that the use of computer networks provides an important and effective resource for geography instruction. Describes the use of the Internet network in physical geography instruction. Provides an example of the use of Internet resources in a climatology/meteorology course. (CFR)

  5. Computer and information networks.

    PubMed

    Greenberger, M; Aronofsky, J; McKenney, J L; Massy, W F

    1973-10-01

    The most basic conclusion coming out of the EDUCOM seminars is that computer networking must be acknowledged as an important new mode for obtaining information and computation (15). It is a real alternative that needs to be given serious attention in current planning and decision-making. Yet the fact is that many institutions are not taking account of networks when they confer on whether or how to replace their main computer. Articulation of the possibilities of computer networks goes back to the early 1960's and before, and working networks have been in evidence for several years now, both commercially and in universities. What is new, however, is the unmistakable recognition-bordering on a sense of the inevitable-that networks are finally practical and here to stay. The visionary and promotional phases of computer networks are over. It is time for hard-nosed comparative analysis (16). Another conclusion of the seminars has to do with the factors that hinder the fuller development of networking. The major problems to be overcome in applying networks to research and education are political, organizational, and economic in nature rather than technological. This is not to say that the hardware and software problems of linking computers and information systems are completely solved, but they are not the big bottlenecks at present. Research and educational institutions must find ways to organize themselves as well as their computers to work together for greater resource sharing. The coming of age of networks takes on special significance as a result of widespread dissatisfactions expressed with the present computing situation. There is a feeling that the current mode of autonomous, self-sufficient operation in the provision of computing and information services is frequently wasteful, deficient, and unresponsive to users' needs because of duplication of effort from one installation to another, incompatibilities, and inadequate documentation, program support, and user assistance. Complaints about the relative lack of uniform standards and the paucity of information on what programs and data are available and how to get and use them are commonplace. The human tendency, when beset by problems such as these, is to seek a savior in the next new technology-networks in this case. But networking does not in and of itself offer a solution to current deficiencies. What it does offer is a promising vehicle with which to bring about important changes in user practices, institutional procedures, and government policy that can lead to effective solutions. Thus more critical than whether networking is developed and applied is how it is developed and applied. For example, networking emphasizes the need for standards and good documentation. Unless effective mechanisms are developed and strong measures taken in networking to ensure that suitable standards and documentation are developed, present inadequacies could get worse, not better. PMID:4730053

  6. Designing Computer-Accented Courses.

    ERIC Educational Resources Information Center

    Rao, Ashok

    1988-01-01

    Explains a systematic process for integrating computers into college coursework. Computer support for traditional learning delivery modes including lectures, cases, and simulation is described; new teaching methods emphasizing the amount of structure and instructor involvement are discussed; and a four stage learning process based on behavioral…

  7. Computers across the Curriculum: Teaching a Computer Literacy Course for Multi-Disciplinary Use in a Network Environment--Content and Pedagogy.

    ERIC Educational Resources Information Center

    Ormerod, Dana E.

    Kent State University (Ohio) Regional Campuses have conducted surveys of their applied business associate degree graduates in office management, accounting, business management, and their employers. Responses indicated the need for computer literacy appropriate to the employment situation. In addition, instructors of traditional liberal arts…

  8. Network Coding for Function Computation

    ERIC Educational Resources Information Center

    Appuswamy, Rathinakumar

    2011-01-01

    In this dissertation, the following "network computing problem" is considered. Source nodes in a directed acyclic network generate independent messages and a single receiver node computes a target function f of the messages. The objective is to maximize the average number of times f can be computed per network usage, i.e., the "computing…

  9. Computer Applications Course Goals, Outlines, and Objectives.

    ERIC Educational Resources Information Center

    Law, Debbie; Morgan, Michele

    This document contains a curriculum model that is designed to provide high school computer teachers with practical ideas for a 1-year computer applications course combining 3 quarters of instruction in keyboarding and 1 quarter of basic instruction in databases and spreadsheets. The document begins with a rationale and a 10-item list of…

  10. Plagiarism in computer science courses

    SciTech Connect

    Harris, J.K.

    1994-12-31

    Plagiarism of computer programs has long been a problem in higher education. Ease of electronic copying, vague understanding by students as to what constitutes plagiarism, increasing acceptance of plagiarism by students, lack of enforcement by instructors and school administrators, and a whole host of other factors contribute to plagiarism. The first step in curbing plagiarism is prevention, the second (and much less preferable) is detection. History files and software metrics can be used as a tool to aid in detecting possible plagiarism. This paper gives advice concerning how to deal with plagiarism and with using software monitors to detect plagiarism.

  11. Computer Networks and Networking: A Primer.

    ERIC Educational Resources Information Center

    Collins, Mauri P.

    1993-01-01

    Provides a basic introduction to computer networks and networking terminology. Topics addressed include modems; the Internet; TCP/IP (Transmission Control Protocol/Internet Protocol); transmission lines; Internet Protocol numbers; network traffic; Fidonet; file transfer protocol (FTP); TELNET; electronic mail; discussion groups; LISTSERV; USENET;…

  12. A social implications of computing course which teaches computer ethics

    SciTech Connect

    Pulliam, S.C.

    1994-12-31

    Computers are integral to today`s world, forming our society as well as responding to it, In recognition of this interaction, as well as in response to requirements by the Computer Science Accrediting Board (CSAB), many schools are incorporating computer ethics and values and addressing the social implications of computing within their curriculum. The approach discussed here is through a separate course, rather than relying on the integration of specific topics throughout the curriculum.

  13. A Survey of Computer Science Capstone Course Literature

    ERIC Educational Resources Information Center

    Dugan, Robert F., Jr.

    2011-01-01

    In this article, we surveyed literature related to undergraduate computer science capstone courses. The survey was organized around course and project issues. Course issues included: course models, learning theories, course goals, course topics, student evaluation, and course evaluation. Project issues included: software process models, software

  14. A Survey of Computer Science Capstone Course Literature

    ERIC Educational Resources Information Center

    Dugan, Robert F., Jr.

    2011-01-01

    In this article, we surveyed literature related to undergraduate computer science capstone courses. The survey was organized around course and project issues. Course issues included: course models, learning theories, course goals, course topics, student evaluation, and course evaluation. Project issues included: software process models, software…

  15. Course Goals in Computer Education, K-12.

    ERIC Educational Resources Information Center

    Allenbrand, Bob, Ed.; And Others

    Designed to be used in conjunction with a school district's educational goals and focusing on what is to be learned rather than the methodology to be used, the program and course goals presented here are intended as guidelines for planning and evaluating elementary and secondary school curricula in computer education. Of four possible levels of…

  16. Augmenting computer networks

    NASA Technical Reports Server (NTRS)

    Bokhari, S. H.; Raza, A. D.

    1984-01-01

    Three methods of augmenting computer networks by adding at most one link per processor are discussed: (1) A tree of N nodes may be augmented such that the resulting graph has diameter no greater than 4log sub 2((N+2)/3)-2. Thi O(N(3)) algorithm can be applied to any spanning tree of a connected graph to reduce the diameter of that graph to O(log N); (2) Given a binary tree T and a chain C of N nodes each, C may be augmented to produce C so that T is a subgraph of C. This algorithm is O(N) and may be used to produce augmented chains or rings that have diameter no greater than 2log sub 2((N+2)/3) and are planar; (3) Any rectangular two-dimensional 4 (8) nearest neighbor array of size N = 2(k) may be augmented so that it can emulate a single step shuffle-exchange network of size N/2 in 3(t) time steps.

  17. A Computer-based Course in Classical Mechanics.

    ERIC Educational Resources Information Center

    Kane, D.; Sherwood, B.

    1980-01-01

    Describes and illustrates the tutorial and homework exercise lessons, student routing, course organization, administration, and evaluation of a PLATO computer-based course in classical mechanics. An appendix lists 41 lessons developed for the course. (CMV)

  18. Course Structure Effects on Students' Computer Anxiety, Confidence and Attitudes.

    ERIC Educational Resources Information Center

    Bohlin, Roy M.; Hunt, Nancy P.

    1995-01-01

    Describes a study that investigated the effects of course structure variables, including course length and course frequency, on the computer anxiety, confidence, and attitudes of pre- and inservice teachers. Results show students in courses that met over a longer period of time had significantly greater changes in computer anxiety, confidence, and

  19. The Effects of Course Structure on Students' Computer Attitudes.

    ERIC Educational Resources Information Center

    Bohlin, Roy M.; Hunt, Nancy P.

    This study investigated the effects of course structure variables on the computer anxiety, confidence, and attitudes of college students. Course structure variables include the number of weeks the course met (course length) and the number of meetings per week (course frequency). The effects of differences in instructors' use of anxiety reducing

  20. Queueing in networks of computers

    NASA Technical Reports Server (NTRS)

    Denning, Peter J.

    1991-01-01

    The designers of networks of computers must assess the capacity of the network to complete work within reasonable times. The utilization law, Little's law, forced-flow law, and response time formula are simple tools that can be used to calculate throughput and response times of networks. Bottleneck analysis can be used to calculate simple lower bounds on response time in terms of individual server parameters and the load on network as a whole. These simple results are important tools for all users of scientific networks - back of the envelope calculations can quickly reveal the effects of distant servers on local throughput and response time.

  1. Computer Art--A New Course Offering for General Education.

    ERIC Educational Resources Information Center

    Hertlein, Grace C.

    The developmental background and rationale are given for an introductory course in computers. Using computer art as the vehicle for instruction, this course is designed for people in disciplines other than computer science. The 16-week course syllabus described contains a weekly lecture, laboratory activities, assignments, and final exams. Several…

  2. Using Computers in Introductory Astronomy Courses

    NASA Astrophysics Data System (ADS)

    Deming, Grace L.

    1995-12-01

    Computer literacy is fast becoming a focal point in undergraduate education. Scientific literacy has been a continuing goal of undergraduate programs across the nation and a course in introductory astronomy is often used to satisfy such science requirements. At U. MD an introduction to computer skills is being integrated into our astronomy curriculum for non-science majors. The campus is adequately equipped with computer labs, yet many students enter college without basic computer skills. In Astronomy 101 (General Astronomy) students are introduced to electronic mail, a Listserver, and the world wide web. Students in this course are required to register for a free campus computer account. Their first assignment is to use e-mail to subscribe to the class Listserver, Milkyway. Through Milkyway, students have access to weekly lecture summaries, questions to review for exams, and copies of previous exams. Using e-mail students may pose questions, provide comments, or exchange opinions using Milkyway, or they may e-mail the instructor directly. Studies indicate that using e-mail is less intimidating to a student than asking a question in a class of 200 students. Monitoring e-mail for student questions has not been a problem. Student reaction has been favorable to using e-mail, since instructor office hours are not always convenient, especially to commuting or working students. Through required assignments, students receive an introduction to accessing information on the world wide web using Netscape. Astronomy has great resources available on the Internet which can be used to supplement and reinforce introductory material. Assignments are structured so that students will gain the techniques necessary to access available information. It is hoped that students will successfully apply the computer skills they learn in astronomy class to their own fields and as life-long learners. We have found that students comfortable with computers are willing to share their knowledge with others. The computer activities have been structured to promote cooperation between students. These skills are also necessary for success.

  3. LINCS: Livermore's network architecture. [Octopus computing network

    SciTech Connect

    Fletcher, J.G.

    1982-01-01

    Octopus, a local computing network that has been evolving at the Lawrence Livermore National Laboratory for over fifteen years, is currently undergoing a major revision. The primary purpose of the revision is to consolidate and redefine the variety of conventions and formats, which have grown up over the years, into a single standard family of protocols, the Livermore Interactive Network Communication Standard (LINCS). This standard treats the entire network as a single distributed operating system such that access to a computing resource is obtained in a single way, whether that resource is local (on the same computer as the accessing process) or remote (on another computer). LINCS encompasses not only communication but also such issues as the relationship of customer to server processes and the structure, naming, and protection of resources. The discussion includes: an overview of the Livermore user community and computing hardware, the functions and structure of each of the seven layers of LINCS protocol, the reasons why we have designed our own protocols and why we are dissatisfied by the directions that current protocol standards are taking.

  4. Computer (PC/Network) Coordinator.

    ERIC Educational Resources Information Center

    Ohio State Univ., Columbus. Center on Education and Training for Employment.

    This publication contains 22 subjects appropriate for use in a competency list for the occupation of computer (PC/network) coordinator, 1 of 12 occupations within the business/computer technologies cluster. Each unit consists of a number of competencies; a list of competency builders is provided for each competency. Titles of the 22 units are as…

  5. A CAD (Classroom Assessment Design) of a Computer Programming Course

    ERIC Educational Resources Information Center

    Hawi, Nazir S.

    2012-01-01

    This paper presents a CAD (classroom assessment design) of an entry-level undergraduate computer programming course "Computer Programming I". CAD has been the product of a long experience in teaching computer programming courses including teaching "Computer Programming I" 22 times. Each semester, CAD is evaluated and modified for the subsequent…

  6. Computer Business Applications II. Course Two. Information Systems Curriculum.

    ERIC Educational Resources Information Center

    O'Neil, Sharon Lund; Everett, Donna R.

    This course is the second of seven in the Information Systems curriculum. The purpose of the course is to build on the skills acquired in the prerequisite course, Computer Business Applications I, through the manipulation of word processing, spreadsheet, database management, and graphics software. An overview of the course sets forth the condition…

  7. Software Tools: A One-Semester Secondary School Computer Course.

    ERIC Educational Resources Information Center

    Bromley, John; Lakatos, John

    1985-01-01

    Provides a course outline, describes equipment and teacher requirements, discusses student evaluation and course outcomes, and details the computer programs used in a high school course. The course is designed to teach students use of the microcomputer as a tool through hands-on experience with a variety of commercial software programs. (MBR)

  8. Using Virtualization and Automatic Evaluation: Adapting Network Services Management Courses to the EHEA

    ERIC Educational Resources Information Center

    Ros, S.; Robles-Gomez, A.; Hernandez, R.; Caminero, A. C.; Pastor, R.

    2012-01-01

    This paper outlines the adaptation of a course on the management of network services in operating systems, called NetServicesOS, to the context of the new European Higher Education Area (EHEA). NetServicesOS is a mandatory course in one of the official graduate programs in the Faculty of Computer Science at the Universidad Nacional de Educacion a…

  9. Combining Cloud Networks and Course Management Systems for Enhanced Analysis in Teaching Laboratories

    ERIC Educational Resources Information Center

    Abrams, Neal M.

    2012-01-01

    A cloud network system is combined with standard computing applications and a course management system to provide a robust method for sharing data among students. This system provides a unique method to improve data analysis by easily increasing the amount of sampled data available for analysis. The data can be shared within one course as well as…

  10. Combining Cloud Networks and Course Management Systems for Enhanced Analysis in Teaching Laboratories

    ERIC Educational Resources Information Center

    Abrams, Neal M.

    2012-01-01

    A cloud network system is combined with standard computing applications and a course management system to provide a robust method for sharing data among students. This system provides a unique method to improve data analysis by easily increasing the amount of sampled data available for analysis. The data can be shared within one course as well as

  11. Using Virtualization and Automatic Evaluation: Adapting Network Services Management Courses to the EHEA

    ERIC Educational Resources Information Center

    Ros, S.; Robles-Gomez, A.; Hernandez, R.; Caminero, A. C.; Pastor, R.

    2012-01-01

    This paper outlines the adaptation of a course on the management of network services in operating systems, called NetServicesOS, to the context of the new European Higher Education Area (EHEA). NetServicesOS is a mandatory course in one of the official graduate programs in the Faculty of Computer Science at the Universidad Nacional de Educacion a

  12. Computer Network Security- The Challenges of Securing a Computer Network

    NASA Technical Reports Server (NTRS)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  13. Optical computer switching network

    NASA Technical Reports Server (NTRS)

    Clymer, B.; Collins, S. A., Jr.

    1985-01-01

    The design for an optical switching system for minicomputers that uses an optical spatial light modulator such as a Hughes liquid crystal light valve is presented. The switching system is designed to connect 80 minicomputers coupled to the switching system by optical fibers. The system has two major parts: the connection system that connects the data lines by which the computers communicate via a two-dimensional optical matrix array and the control system that controls which computers are connected. The basic system, the matrix-based connecting system, and some of the optical components to be used are described. Finally, the details of the control system are given and illustrated with a discussion of timing.

  14. Hyperswitch Network For Hypercube Computer

    NASA Technical Reports Server (NTRS)

    Chow, Edward; Madan, Herbert; Peterson, John

    1989-01-01

    Data-driven dynamic switching enables high speed data transfer. Proposed hyperswitch network based on mixed static and dynamic topologies. Routing header modified in response to congestion or faults encountered as path established. Static topology meets requirement if nodes have switching elements that perform necessary routing header revisions dynamically. Hypercube topology now being implemented with switching element in each computer node aimed at designing very-richly-interconnected multicomputer system. Interconnection network connects great number of small computer nodes, using fixed hypercube topology, characterized by point-to-point links between nodes.

  15. Computers and Problem Solving: An Independent Study Course.

    ERIC Educational Resources Information Center

    Moursund, David

    The first chapter of this text for an independent study course on computers and problem solving provides an overview of computers in education which focuses on the three main instructional uses of computers in schools--learning about computers, the computer-as-tool, and computer-assisted instruction. Using a workshop format, chapter 2 discusses…

  16. Collective network for computer structures

    DOEpatents

    Blumrich, Matthias A; Coteus, Paul W; Chen, Dong; Gara, Alan; Giampapa, Mark E; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E; Steinmacher-Burow, Burkhard D; Vranas, Pavlos M

    2014-01-07

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to the needs of a processing algorithm.

  17. Collective network for computer structures

    DOEpatents

    Blumrich, Matthias A.; Coteus, Paul W.; Chen, Dong; Gara, Alan; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E.; Steinmacher-Burow, Burkhard D.; Vranas, Pavlos M.

    2011-08-16

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices ate included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network and class structures. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to needs of a processing algorithm.

  18. Networking DEC and IBM computers

    NASA Technical Reports Server (NTRS)

    Mish, W. H.

    1983-01-01

    Local Area Networking of DEC and IBM computers within the structure of the ISO-OSI Seven Layer Reference Model at a raw signaling speed of 1 Mops or greater are discussed. After an introduction to the ISO-OSI Reference Model nd the IEEE-802 Draft Standard for Local Area Networks (LANs), there follows a detailed discussion and comparison of the products available from a variety of manufactures to perform this networking task. A summary of these products is presented in a table.

  19. Improving Student Engagement Using Course-Based Social Networks

    ERIC Educational Resources Information Center

    Imlawi, Jehad Mohammad

    2013-01-01

    This study proposes an engagement model that supports use of course-based online social networks for engaging student, and hence, improving their educational outcomes. This research demonstrates that instructors who create course-based online social networks to communicate with students can increase the student engagement in these online social…

  20. Simulation of reliability in multiserver computer networks

    NASA Astrophysics Data System (ADS)

    Minkevičius, Saulius

    2012-11-01

    The performance in terms of reliability of computer multiserver networks motivates this paper. The probability limit theorem is derived on the extreme queue length in open multiserver queueing networks in heavy traffic and applied to a reliability model for multiserver computer networks where we relate the time of failure of a multiserver computer network to the system parameters.

  1. Teaching Computers and the Humanities Courses: A Survey.

    ERIC Educational Resources Information Center

    Rudman, Joseph

    1987-01-01

    The fifth in a series of surveys of computer courses for humanists, this article provides information about past and present courses for those designing such a program. Presents statistics on the numbers of courses offered by departments, the texts used, the types of equipment available, and the programming languages taught. (GEA)

  2. Integrating Emerging Topics through Online Team Design in a Hybrid Communication Networks Course: Interaction Patterns and Impact of Prior Knowledge

    ERIC Educational Resources Information Center

    Reisslein, Jana; Seeling, Patrick; Reisslein, Martin

    2005-01-01

    An important challenge in the introductory communication networks course in electrical and computer engineering curricula is to integrate emerging topics, such as wireless Internet access and network security, into the already content-intensive course. At the same time it is essential to provide students with experiences in online collaboration,…

  3. Integrating Emerging Topics through Online Team Design in a Hybrid Communication Networks Course: Interaction Patterns and Impact of Prior Knowledge

    ERIC Educational Resources Information Center

    Reisslein, Jana; Seeling, Patrick; Reisslein, Martin

    2005-01-01

    An important challenge in the introductory communication networks course in electrical and computer engineering curricula is to integrate emerging topics, such as wireless Internet access and network security, into the already content-intensive course. At the same time it is essential to provide students with experiences in online collaboration,

  4. Integrating Computational Chemistry into a Course in Classical Thermodynamics

    ERIC Educational Resources Information Center

    Martini, Sheridan R.; Hartzell, Cynthia J.

    2015-01-01

    Computational chemistry is commonly addressed in the quantum mechanics course of undergraduate physical chemistry curricula. Since quantum mechanics traditionally follows the thermodynamics course, there is a lack of curricula relating computational chemistry to thermodynamics. A method integrating molecular modeling software into a semester long

  5. Integrating Computational Chemistry into a Course in Classical Thermodynamics

    ERIC Educational Resources Information Center

    Martini, Sheridan R.; Hartzell, Cynthia J.

    2015-01-01

    Computational chemistry is commonly addressed in the quantum mechanics course of undergraduate physical chemistry curricula. Since quantum mechanics traditionally follows the thermodynamics course, there is a lack of curricula relating computational chemistry to thermodynamics. A method integrating molecular modeling software into a semester long…

  6. An Introduction to Computing: Content for a High School Course.

    ERIC Educational Resources Information Center

    Rogers, Jean B.

    A general outline of the topics that might be covered in a computers and computing course for high school students is provided. Topics are listed in the order in which they should be taught, and the relative amount of time to be spent on each topic is suggested. Seven units are included in the course outline: (1) general introduction, (2) using…

  7. Computer networking at SLR stations

    NASA Technical Reports Server (NTRS)

    Novotny, Antonin

    1993-01-01

    There are several existing communication methods to deliver data from the satellite laser ranging (SLR) station to the SLR data center and back: telephonmodem, telex, and computer networks. The SLR scientific community has been exploiting mainly INTERNET, BITNET/EARN, and SPAN. The total of 56 countries are connected to INTERNET and the number of nodes is exponentially growing. The computer networks mentioned above and others are connected through E-mail protocol. The scientific progress of SLR requires the increase of communication speed and the amount of the transmitted data. The TOPEX/POSEIDON test campaign required to deliver Quick Look data (1.7 kB/pass) from a SLR site to SLR data center within 8 hours and full rate data (up to 500 kB/pass) within 24 hours. We developed networking for the remote SLR station in Helwan, Egypt. The reliable scheme for data delivery consists of: compression of MERIT2 format (up to 89 percent), encoding to ASCII Me (files); and e-mail sending from SLR station--e-mail receiving, decoding, and decompression at the center. We do propose to use the ZIP method for compression/decompression and the UUCODE method for ASCII encoding/decoding. This method will be useful for stations connected via telephonemodems or commercial networks. The electronics delivery could solve the problem of the too late receiving of the FR data by SLR data center.

  8. Computer networking at SLR stations

    NASA Astrophysics Data System (ADS)

    Novotny, Antonin

    1993-06-01

    There are several existing communication methods to deliver data from the satellite laser ranging (SLR) station to the SLR data center and back: telephonmodem, telex, and computer networks. The SLR scientific community has been exploiting mainly INTERNET, BITNET/EARN, and SPAN. The total of 56 countries are connected to INTERNET and the number of nodes is exponentially growing. The computer networks mentioned above and others are connected through E-mail protocol. The scientific progress of SLR requires the increase of communication speed and the amount of the transmitted data. The TOPEX/POSEIDON test campaign required to deliver Quick Look data (1.7 kB/pass) from a SLR site to SLR data center within 8 hours and full rate data (up to 500 kB/pass) within 24 hours. We developed networking for the remote SLR station in Helwan, Egypt. The reliable scheme for data delivery consists of: compression of MERIT2 format (up to 89 percent), encoding to ASCII Me (files); and e-mail sending from SLR station--e-mail receiving, decoding, and decompression at the center. We do propose to use the ZIP method for compression/decompression and the UUCODE method for ASCII encoding/decoding. This method will be useful for stations connected via telephonemodems or commercial networks. The electronics delivery could solve the problem of the too late receiving of the FR data by SLR data center.

  9. Student Learning Networks on Residential Field Courses: Does Size Matter?

    ERIC Educational Resources Information Center

    Langan, A. Mark; Cullen, W. Rod; Shuker, David M.

    2008-01-01

    This article describes learner and tutor reports of a learning network that formed during the completion of investigative projects on a residential field course. Staff and students recorded project-related interactions, who they were with and how long they lasted over four phases during the field course. An enquiry based learning format challenged…

  10. Software Standards in Undergraduate Computing Courses.

    ERIC Educational Resources Information Center

    Joy, Mike; Luck, M.

    1996-01-01

    Discusses the importance of standards in introductory programming courses that enable novice software developers to write correct programs to specification and time. Considers issues involved with assessing students' programming abilities. Provides an overview of an automated assessment system adopted at the University of Warwick (United Kingdom)

  11. Time-course of cortical networks involved in working memory.

    PubMed

    Luu, Phan; Caggiano, Daniel M; Geyer, Alexandra; Lewis, Jenn; Cohn, Joseph; Tucker, Don M

    2014-01-01

    Working memory (WM) is one of the most studied cognitive constructs. Although many neuroimaging studies have identified brain networks involved in WM, the time course of these networks remains unclear. In this paper we use dense-array electroencephalography (dEEG) to capture neural signals during performance of a standard WM task, the n-back task, and a blend of principal components analysis and independent components analysis (PCA/ICA) to statistically identify networks of WM and their time courses. Results reveal a visual cortex centric network, that also includes the posterior cingulate cortex, that is active prior to stimulus onset and that appears to reflect anticipatory, attention-related processes. After stimulus onset, the ventromedial prefrontal cortex, lateral prefrontal prefrontal cortex, and temporal poles become associated with the prestimulus network. This second network appears to reflect executive control processes. Following activation of the second network, the cortices of the temporo-parietal junction with the temporal lobe structures seen in the first and second networks re-engage. This third network appears to reflect activity of the ventral attention network involved in control of attentional reorientation. The results point to important temporal features of network dynamics that integrate multiple subsystems of the ventral attention network with the default mode network in the performance of working memory tasks. PMID:24523686

  12. Addressing Small Computers in the First OS Course

    ERIC Educational Resources Information Center

    Nutt, Gary

    2006-01-01

    Small computers are emerging as important components of the contemporary computing scene. Their operating systems vary from specialized software for an embedded system to the same style of OS used on a generic desktop or server computer. This article describes a course in which systems are classified by their hardware capability and the…

  13. Addressing Small Computers in the First OS Course

    ERIC Educational Resources Information Center

    Nutt, Gary

    2006-01-01

    Small computers are emerging as important components of the contemporary computing scene. Their operating systems vary from specialized software for an embedded system to the same style of OS used on a generic desktop or server computer. This article describes a course in which systems are classified by their hardware capability and the

  14. Delayed commutation in quantum computer networks.

    PubMed

    García-Escartín, Juan Carlos; Chamorro-Posada, Pedro

    2006-09-15

    In the same way that classical computer networks connect and enhance the capabilities of classical computers, quantum networks can combine the advantages of quantum information and communication. We propose a nonclassical network element, a delayed commutation switch, that can solve the problem of switching time in packet switching networks. With the help of some local ancillary qubits and superdense codes, we can route a qubit packet after part of it has left the network node. PMID:17025870

  15. Experiences of Using Automated Assessment in Computer Science Courses

    ERIC Educational Resources Information Center

    English, John; English, Tammy

    2015-01-01

    In this paper we discuss the use of automated assessment in a variety of computer science courses that have been taught at Israel Academic College by the authors. The course assignments were assessed entirely automatically using Checkpoint, a web-based automated assessment framework. The assignments all used free-text questions (where the students…

  16. Computer Based Reference Service--A Course Taught by Practitioners

    ERIC Educational Resources Information Center

    Knapp, Sara D.; Gavryck, Jacquelyn A.

    1978-01-01

    An overview is provided of a computer based reference course at the State University of New York at Albany which uses the ERIC file on BRS to teach online searching techniques. Course highlights include question negotiation, Venn diagramming, explanation of STAIRS file structure and Boolean logic, and management of services. (J PF)

  17. Cyber-Seniors: Planning Computer Courses for Older Adults.

    ERIC Educational Resources Information Center

    Donohue, Sue; Herres, Lorelei

    This study was designed to solicit responses from senior citizens (adults over the age of 55) who had enrolled in a computer course after retirement. The information is intended to aid program planners for seniors in developing future courses. Seventy-six seniors from four local sites (Puget Sound, Washington) and two nationwide online services…

  18. Automating a Massive Online Course with Cluster Computing

    ERIC Educational Resources Information Center

    Haas, Timothy C.

    2016-01-01

    Before massive numbers of students can take online courses for college credit, the challenges of providing tutoring support, answers to student-posed questions, and the control of cheating will need to be addressed. These challenges are taken up here by developing an online course delivery system that runs in a cluster computing environment and is…

  19. Development of a Computer Communications Course Plus Laboratory.

    ERIC Educational Resources Information Center

    Couch, Leon W.; Shaffer, Charles V.

    1985-01-01

    Describes a computer communication course (and its associated laboratory) developed for electrical engineering students at the University of Florida. The course teaches seniors and graduate students the theoretical limits that affect the implementation of serial digital communications and surveys the interface standards, data link protocols, and

  20. Experiences of Using Automated Assessment in Computer Science Courses

    ERIC Educational Resources Information Center

    English, John; English, Tammy

    2015-01-01

    In this paper we discuss the use of automated assessment in a variety of computer science courses that have been taught at Israel Academic College by the authors. The course assignments were assessed entirely automatically using Checkpoint, a web-based automated assessment framework. The assignments all used free-text questions (where the students

  1. Combining Cases and Computer Simulations in Strategic Management Courses

    ERIC Educational Resources Information Center

    Mitchell, Rex C.

    2004-01-01

    In this study, the author compared the effectiveness of two different strategic management course designs: one centered on case discussions and the other combining a computer-based simulation with some cases. In addition to evaluation of the research literature, the study involved experiments with six course sections composed of 130 students, Both

  2. Terminal-oriented computer-communication networks.

    NASA Technical Reports Server (NTRS)

    Schwartz, M.; Boorstyn, R. R.; Pickholtz, R. L.

    1972-01-01

    Four examples of currently operating computer-communication networks are described in this tutorial paper. They include the TYMNET network, the GE Information Services network, the NASDAQ over-the-counter stock-quotation system, and the Computer Sciences Infonet. These networks all use programmable concentrators for combining a multiplicity of terminals. Included in the discussion for each network is a description of the overall network structure, the handling and transmission of messages, communication requirements, routing and reliability consideration where applicable, operating data and design specifications where available, and unique design features in the area of computer communications.

  3. Software For Monitoring A Computer Network

    NASA Technical Reports Server (NTRS)

    Lee, Young H.

    1992-01-01

    SNMAT is rule-based expert-system computer program designed to assist personnel in monitoring status of computer network and identifying defective computers, workstations, and other components of network. Also assists in training network operators. Network for SNMAT located at Space Flight Operations Center (SFOC) at NASA's Jet Propulsion Laboratory. Intended to serve as data-reduction system providing windows, menus, and graphs, enabling users to focus on relevant information. SNMAT expected to be adaptable to other computer networks; for example in management of repair, maintenance, and security, or in administration of planning systems, billing systems, or archives.

  4. "Horses for Courses": Categories of Computer-Based Learning Program and Their Uses in Pharmacology Courses.

    ERIC Educational Resources Information Center

    Hughes, Ian E.

    1998-01-01

    Describes the pharma-CAL-ogy project, funded by Teaching and Learning Technology Programme (TLTP), which has developed various types of software for use in pharmacology courses. Topics include course organization and delivery software, drill and practice software, tutorial-type programs, simulations, and the need to integrate computer-assisted

  5. "Horses for Courses": Categories of Computer-Based Learning Program and Their Uses in Pharmacology Courses.

    ERIC Educational Resources Information Center

    Hughes, Ian E.

    1998-01-01

    Describes the pharma-CAL-ogy project, funded by Teaching and Learning Technology Programme (TLTP), which has developed various types of software for use in pharmacology courses. Topics include course organization and delivery software, drill and practice software, tutorial-type programs, simulations, and the need to integrate computer-assisted…

  6. Getting computer science students to take more physics courses

    NASA Astrophysics Data System (ADS)

    Sherwood, Bruce A.

    1997-03-01

    Many of the brightest students now entering college choose to major in computer science. Due to the high prestige of its School of Computer Science, Carnegie Mellon is now attracting very highly qualified computer science students. These students not only do well in coursework but often exhibit an unusually high degree of intellectual curiousity inside and outside the classroom, and this sometimes leads to taking extra physics courses or even minoring in physics. Although not originally aimed specifically at computer science students, some innovations in Carnegie Mellon physics courses have been particularly attractive to these students.

  7. Code 672 observational science branch computer networks

    NASA Technical Reports Server (NTRS)

    Hancock, D. W.; Shirk, H. G.

    1988-01-01

    In general, networking increases productivity due to the speed of transmission, easy access to remote computers, ability to share files, and increased availability of peripherals. Two different networks within the Observational Science Branch are described in detail.

  8. Computer Mediated Tutorial Support for Conventional University Courses.

    ERIC Educational Resources Information Center

    Light, Paul; Colbourn, C.; Light, V.

    1997-01-01

    Psychology students at the University of Southampton use "skywriting," an e-mail based discussion medium involving tutors and students and focusing on issues arising from course content. This article discusses student participation in skywriting; examines effects of gender, computer attitudes, and computer experience; compares student contribution…

  9. A Computer Course for Business Students: Teacher's Guide.

    ERIC Educational Resources Information Center

    Waterhouse, Ann

    This teacher's guide is for a course designed to teach business students the fundamentals of the BASIC language and computer programming using a series of business-oriented programs. Each lesson contains an introduction, flow charts, and computer programs. The six lesson topics are print-out and format control, count-average, withholding tax…

  10. Integration of Computers into a Course on Biostatistics

    ERIC Educational Resources Information Center

    Gjerde, Craig L.

    1977-01-01

    The biostatistics course for undergraduate medical and dental students at the University of Connecticut Health Center is taught by the Keller Plan, and students can use computers to analyze data sets and to score their unit tests. The computer is an essential tool for data analysis and an attractive option for test scoring. (LBH)

  11. Micro Computer Technician Course. Course Design, Course Curricula, Learning Units, Resource Requirements. InfoTVE 14.

    ERIC Educational Resources Information Center

    Royal Melbourne Inst. of Tech. (Australia).

    This guide to the core curricula for the training of microcomputer technicians is designed for school leavers after 10 or more years of general/vocational education with a science and mathematics background. The 2-year course is to be administered in four semesters. An introductory outline of course design and curricula provides the rationale,…

  12. Course 10: Three Lectures on Biological Networks

    NASA Astrophysics Data System (ADS)

    Magnasco, M. O.

    1 Enzymatic networks. Proofreading knots: How DNA topoisomerases disentangle DNA 1.1 Length scales and energy scales 1.2 DNA topology 1.3 Topoisomerases 1.4 Knots and supercoils 1.5 Topological equilibrium 1.6 Can topoisomerases recognize topology? 1.7 Proposal: Kinetic proofreading 1.8 How to do it twice 1.9 The care and proofreading of knots 1.10 Suppression of supercoils 1.11 Problems and outlook 1.12 Disquisition 2 Gene expression networks. Methods for analysis of DNA chip experiments 2.1 The regulation of gene expression 2.2 Gene expression arrays 2.3 Analysis of array data 2.4 Some simplifying assumptions 2.5 Probeset analysis 2.6 Discussion 3 Neural and gene expression networks: Song-induced gene expression in the canary brain 3.1 The study of songbirds 3.2 Canary song 3.3 ZENK 3.4 The blush 3.5 Histological analysis 3.6 Natural vs. artificial 3.7 The Blush II: gAP 3.8 Meditation

  13. Integrating ethical topics in a traditional computer science course

    SciTech Connect

    Winrich, L.B.

    1994-12-31

    It is never hard to find additional, often unconventional, topics which seem to beg inclusion in standard courses. A dynamic discipline like computer science usually provides a steady stream of new technical ideas to vie for time and attention with more traditional material. As difficult as it may be to keep standard CS courses up-to-date with technical innovations, it often seems even more difficult to include non-technical topics even when there is universal agreement on their importance, Inevitably the question of whether or not such inclusion will compromise the technical content of the course arises. This paper describes an attempt to include two such topics in a traditional course in data structures. The two topics are writing and ethics and, although the effort concentrates on the inclusion of ethical questions in a standard CS course, writing is the vehicle for accomplishing this goal. Furthermore, the inclusion writing in the CS curriculum is certainly recognized as a desirable outcome.

  14. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    ERIC Educational Resources Information Center

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…

  15. Neural-Network Computer Transforms Coordinates

    NASA Technical Reports Server (NTRS)

    Josin, Gary M.

    1990-01-01

    Numerical simulation demonstrated ability of conceptual neural-network computer to generalize what it has "learned" from few examples. Ability to generalize achieved with even simple neural network (relatively few neurons) and after exposure of network to only few "training" examples. Ability to obtain fairly accurate mappings after only few training examples used to provide solutions to otherwise intractable mapping problems.

  16. Using E-Mail across Computer Networks.

    ERIC Educational Resources Information Center

    Hazari, Sunil

    1990-01-01

    Discusses the use of telecommunications technology to exchange electronic mail, files, and messages across different computer networks. Networks highlighted include ARPA Internet; BITNET; USENET; FidoNet; MCI Mail; and CompuServe. Examples of the successful use of networks in higher education are given. (Six references) (LRW)

  17. Gateways among Academic Computer Networks.

    ERIC Educational Resources Information Center

    McCredie, John W.

    1984-01-01

    Local area networks for intracampus facilities and national inter-campus networks are discussed. Descriptions of some of these networks (ARPAnet, BITNET, CSNET, EDUNET, MAILNET, RLIN, AND USENET) are provided that illustrate the wide range of academic applications currently available. (Author/MLW)

  18. Teaching an Undergraduate Course on Computational Fluid Dynamics

    NASA Astrophysics Data System (ADS)

    Sheikhi, Reza H.

    2013-11-01

    A new computational fluid dynamics (CFD) course is introduced to Mechanical Engineering undergraduate curriculum at Northeastern University. The main objective is to enable students to make use of CFD in their cooperative-education work, senior capstone project as well as future engineering career. CFD has become an indispensable tool for engineering design & analysis, and it is now available to broad range of users, through commercial software packages. Proper use of these softwares, however, requires basic knowledge of CFD to understand their capabilities and limitations, to be aware of the pitfalls and to interpret the predictions. The course is designed to offer a balanced coverage of essential and applied CFD, with particular emphasis on verification & validation and CFD analysis. Training for a commercial CFD package is an integral part of the course which is facilitated by the use of project-based learning. In this presentation, details of development and implementation of this course will be discussed.

  19. Airlines Network Optimization using Evolutionary Computation

    NASA Astrophysics Data System (ADS)

    Inoue, Hiroki; Kato, Yasuhiko; Sakagami, Tomoya

    In recent years, various networks have come to exist in our surroundings. Not only the internet and airline routes can be thought of as networks: protein interactions are also networks. An “economic network design problem” can be discussed by assuming that a vertex is an economic player and that a link represents some connection between economic players. In this paper, the Airlines network is taken up as an example of an “economic network design problem”, and the Airlines network which the profit of the entire Airlines industry is maximized is clarified. The Airlines network is modeled based on connections models proposed by Jackson and Wolinsky, and the utility function of the network is defined. In addition, the optimization simulation using the evolutionary computation is shown for a domestic airline in Japan.

  20. Computer-Oriented Calculus Courses Using Finite Differences.

    ERIC Educational Resources Information Center

    Gordon, Sheldon P.

    The so-called discrete approach in calculus instruction involves introducing topics from the calculus of finite differences and finite sums, both for motivation and as useful tools for applications of the calculus. In particular, it provides an ideal setting in which to incorporate computers into calculus courses. This approach has been…

  1. An Undergraduate Electrical Engineering Course on Computer Organization.

    ERIC Educational Resources Information Center

    Commission on Engineering Education, Washington, DC.

    Outlined is an undergraduate electrical engineering course on computer organization designed to meet the need for electrical engineers familiar with digital system design. The program includes both hardware and software aspects of digital systems essential to design function and correlates design and organizational aspects of the subject. The…

  2. Multimedia Instructional Tools and Student Learning in Computer Applications Courses

    ERIC Educational Resources Information Center

    Chapman, Debra Laier

    2013-01-01

    Advances in technology and changes in educational strategies have resulted in the integration of technology into the classroom. Multimedia instructional tools (MMIT) have been identified as a way to provide student-centered active-learning instructional material to students. MMITs are common in introductory computer applications courses based on…

  3. Computed Tomography-Enhanced Anatomy Course Using Enterprise Visualization

    ERIC Educational Resources Information Center

    May, Hila; Cohen, Haim; Medlej, Bahaa; Kornreich, Liora; Peled, Nathan; Hershkovitz, Israel

    2013-01-01

    Rapid changes in medical knowledge are forcing continuous adaptation of the basic science courses in medical schools. This article discusses a three-year experience developing a new Computed Tomography (CT)-based anatomy curriculum at the Sackler School of Medicine, Tel Aviv University, including describing the motivations and reasoning for the…

  4. A Term Project for a Course on Computer Forensics

    ERIC Educational Resources Information Center

    Harrison, Warren

    2006-01-01

    The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of forensic tools, in many cases the use of an instructor-developed examination disk avoids utilizing some…

  5. Computed Tomography-Enhanced Anatomy Course Using Enterprise Visualization

    ERIC Educational Resources Information Center

    May, Hila; Cohen, Haim; Medlej, Bahaa; Kornreich, Liora; Peled, Nathan; Hershkovitz, Israel

    2013-01-01

    Rapid changes in medical knowledge are forcing continuous adaptation of the basic science courses in medical schools. This article discusses a three-year experience developing a new Computed Tomography (CT)-based anatomy curriculum at the Sackler School of Medicine, Tel Aviv University, including describing the motivations and reasoning for the

  6. Gender Differences in the Selection of Elective Computer Science Courses.

    ERIC Educational Resources Information Center

    Arenz, Bernard W.; Lee, Miheon J.

    Two studies--conducted in 1987 and 1988 in high schools in the Madison, Wisconsin, Metropolitan School District--investigated the existence of gender related differences in high school elective computer courses and factors affecting the differences. In the first study, a two-part survey was administered to the total population of students enrolled…

  7. A Term Project for a Course on Computer Forensics

    ERIC Educational Resources Information Center

    Harrison, Warren

    2006-01-01

    The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of forensic tools, in many cases the use of an instructor-developed examination disk avoids utilizing some

  8. Queuing theory models for computer networks

    NASA Technical Reports Server (NTRS)

    Galant, David C.

    1989-01-01

    A set of simple queuing theory models which can model the average response of a network of computers to a given traffic load has been implemented using a spreadsheet. The impact of variations in traffic patterns and intensities, channel capacities, and message protocols can be assessed using them because of the lack of fine detail in the network traffic rates, traffic patterns, and the hardware used to implement the networks. A sample use of the models applied to a realistic problem is included in appendix A. Appendix B provides a glossary of terms used in this paper. This Ames Research Center computer communication network is an evolving network of local area networks (LANs) connected via gateways and high-speed backbone communication channels. Intelligent planning of expansion and improvement requires understanding the behavior of the individual LANs as well as the collection of networks as a whole.

  9. The Effect of Computer Literacy Course on Students' Attitudes toward Computer Applications

    ERIC Educational Resources Information Center

    Erlich, Zippy; Gadot, Rivka; Shahak, Daphna

    2009-01-01

    Studies indicate that the use of technologies as teaching aids and tools for self-study is influenced by students' attitudes toward computers and their applications. The purpose of this study is to determine whether taking a Computer Literacy and Applications (CLA) course has an impact on students' attitudes toward computer applications, across…

  10. A first course in computing with applications to biology.

    PubMed

    Libeskind-Hadas, Ran; Bush, Eliot

    2013-09-01

    We believe that undergraduate biology students must acquire a foundational background in computing including how to formulate a computational problem; develop an algorithmic solution; implement their solution in software and then test, document and use their code to explore biological phenomena. Moreover, by learning these skills in the first year, students acquire a powerful tool set that they can use and build on throughout their studies. To address this need, we have developed a first-year undergraduate course that teaches students the foundations of computational thinking and programming in the context of problems in biology. This article describes the structure and content of the course and summarizes assessment data on both affective and learning outcomes. PMID:23449003

  11. Impact of Multimedia and Network Services on an Introductory Level Course

    NASA Technical Reports Server (NTRS)

    Russ, John C.

    1996-01-01

    We will demonstrate and describe the impact of our use of multimedia and network connectivity on a sophomore-level introductory course in materials science. This class services all engineering students, resulting in large (more than 150) class sections with no hands-on laboratory. In 1990 we began to develop computer graphics that might substitute for some laboratory or real-world experiences, and demonstrate relationships hard to show with static textbook images or chalkboard drawings. We created a comprehensive series of modules that cover the entire course content. Called VIMS (Visualizations in Materials Science), these are available in the form of a CD-ROM and also via the internet.

  12. Characteristics of the TRISTAN control computer network

    NASA Astrophysics Data System (ADS)

    Kurokawa, Shin-ichi; Akiyama, Atsuyoshi; Katoh, Tadahiko; Kikutani, Eiji; Koiso, Haruyo; Oide, Katsunobu; Shinomoto, Manabu; Kurihara, Michio; Abe, Ken-ichi

    1986-06-01

    Twenty-four minicomputers forming an N-to- N token-ring network control the TRISTAN accelerator complex. The computers are linked by optical fiber cables with 10 Mbps transmission speed. The software system is based on NODAL, a multicomputer interpretive language developed at the CERN SPS. The high-level services offered to the users of the network are remote execution by the EXEC, EXEC-P and IMEX commands of NODAL and uniform file access throughout the system. The network software was designed to achieve the fast response of the EXEC command. The performance of the network is also reported. Tasks that overload the minicomputers are processed on the KEK central computers. One minicomputer in the network serves as a gateway to KEKNET, which connects the minicomputer network and the central computers. The communication with the central computers is managed within the framework of the KEK NODAL system. NODAL programs communicate with the central computers calling NODAL functions; functions for exchanging data between a data set on the central computers and a NODAL variable, submitting a batch job to the central computers, checking the status of the submitted job, etc. are prepared.

  13. Computer network environment planning and analysis

    NASA Technical Reports Server (NTRS)

    Dalphin, John F.

    1989-01-01

    The GSFC Computer Network Environment provides a broadband RF cable between campus buildings and ethernet spines in buildings for the interlinking of Local Area Networks (LANs). This system provides terminal and computer linkage among host and user systems thereby providing E-mail services, file exchange capability, and certain distributed computing opportunities. The Environment is designed to be transparent and supports multiple protocols. Networking at Goddard has a short history and has been under coordinated control of a Network Steering Committee for slightly more than two years; network growth has been rapid with more than 1500 nodes currently addressed and greater expansion expected. A new RF cable system with a different topology is being installed during summer 1989; consideration of a fiber optics system for the future will begin soon. Summmer study was directed toward Network Steering Committee operation and planning plus consideration of Center Network Environment analysis and modeling. Biweekly Steering Committee meetings were attended to learn the background of the network and the concerns of those managing it. Suggestions for historical data gathering have been made to support future planning and modeling. Data Systems Dynamic Simulator, a simulation package developed at NASA and maintained at GSFC was studied as a possible modeling tool for the network environment. A modeling concept based on a hierarchical model was hypothesized for further development. Such a model would allow input of newly updated parameters and would provide an estimation of the behavior of the network.

  14. Computing Network Bill Viewed as High Priority.

    ERIC Educational Resources Information Center

    Hanson, David

    1991-01-01

    Discussed is the High Performance Computing Act of 1991 which would provide federal funding for the establishment of a National Research and Education network. The rationale for the proposed legislation is discussed. (CW)

  15. Networking Course Syllabus in Accredited Library and Information Science Programs: A Comparative Analysis Study

    ERIC Educational Resources Information Center

    Abouserie, Hossam Eldin Mohamed Refaat

    2009-01-01

    The study investigated networking courses offered in accredited Library and Information Science schools in the United States in 2009. The study analyzed and compared network syllabi according to Course Syllabus Evaluation Rubric to obtain in-depth understanding of basic features and characteristics of networking courses taught. The study embraced…

  16. Network capacity analysis for latent attractor computation.

    PubMed

    Doboli, Simona; Minai, Ali A

    2003-05-01

    Attractor networks have been one of the most successful paradigms in neural computation, and have been used as models of computation in the nervous system. Recently, we proposed a paradigm called 'latent attractors' where attractors embedded in a recurrent network via Hebbian learning are used to channel network response to external input rather than becoming manifest themselves. This allows the network to generate context-sensitive internal codes in complex situations. Latent attractors are particularly helpful in explaining computations within the hippocampus--a brain region of fundamental significance for memory and spatial learning. Latent attractor networks are a special case of associative memory networks. The model studied here consists of a two-layer recurrent network with attractors stored in the recurrent connections using a clipped Hebbian learning rule. The firing in both layers is competitive--K winners take all firing. The number of neurons allowed to fire, K, is smaller than the size of the active set of the stored attractors. The performance of latent attractor networks depends on the number of such attractors that a network can sustain. In this paper, we use signal-to-noise methods developed for standard associative memory networks to do a theoretical and computational analysis of the capacity and dynamics of latent attractor networks. This is an important first step in making latent attractors a viable tool in the repertoire of neural computation. The method developed here leads to numerical estimates of capacity limits and dynamics of latent attractor networks. The technique represents a general approach to analyse standard associative memory networks with competitive firing. The theoretical analysis is based on estimates of the dendritic sum distributions using Gaussian approximation. Because of the competitive firing property, the capacity results are estimated only numerically by iteratively computing the probability of erroneous firings. The analysis contains two cases: the simple case analysis which accounts for the correlations between weights due to shared patterns and the detailed case analysis which includes also the temporal correlations between the network's present and previous state. The latter case predicts better the dynamics of the network state for non-zero initial spurious firing. The theoretical analysis also shows the influence of the main parameters of the model on the storage capacity. PMID:12790185

  17. Phase organization of network computations.

    PubMed

    Wilson, Matthew A; Varela, Carmen; Remondes, Miguel

    2015-04-01

    Coupled oscillations are hypothesized to organize the processing of information across distributed brain circuits. This idea is supported by recent evidence, and newly developed techniques promise to put such theoretical framework to mechanistic testing. We review evidence suggesting that individual oscillatory cycles constitute a functional unit that organizes activity in neural networks, and that oscillatory phase (defined as the fraction of the wave cycle that has elapsed relative to the start of the cycle) is a key oscillatory parameter to implement the functions of oscillations in limbic networks. We highlight neural manipulation techniques that currently allow for causal testing of these hypotheses. PMID:25679370

  18. Optimization of an interactive distributive computer network

    NASA Technical Reports Server (NTRS)

    Frederick, V.

    1985-01-01

    The activities under a cooperative agreement for the development of a computer network are briefly summarized. Research activities covered are: computer operating systems optimization and integration; software development and implementation of the IRIS (Infrared Imaging of Shuttle) Experiment; and software design, development, and implementation of the APS (Aerosol Particle System) Experiment.

  19. Spontaneous Ad Hoc Mobile Cloud Computing Network

    PubMed Central

    Lacuesta, Raquel; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

  20. Spontaneous ad hoc mobile cloud computing network.

    PubMed

    Lacuesta, Raquel; Lloret, Jaime; Sendra, Sandra; Peñalver, Lourdes

    2014-01-01

    Cloud computing helps users and companies to share computing resources instead of having local servers or personal devices to handle the applications. Smart devices are becoming one of the main information processing devices. Their computing features are reaching levels that let them create a mobile cloud computing network. But sometimes they are not able to create it and collaborate actively in the cloud because it is difficult for them to build easily a spontaneous network and configure its parameters. For this reason, in this paper, we are going to present the design and deployment of a spontaneous ad hoc mobile cloud computing network. In order to perform it, we have developed a trusted algorithm that is able to manage the activity of the nodes when they join and leave the network. The paper shows the network procedures and classes that have been designed. Our simulation results using Castalia show that our proposal presents a good efficiency and network performance even by using high number of nodes. PMID:25202715

  1. Computing galled networks from real data

    PubMed Central

    Huson, Daniel H.; Rupp, Regula; Berry, Vincent; Gambette, Philippe; Paul, Christophe

    2009-01-01

    Motivation: Developing methods for computing phylogenetic networks from biological data is an important problem posed by molecular evolution and much work is currently being undertaken in this area. Although promising approaches exist, there are no tools available that biologists could easily and routinely use to compute rooted phylogenetic networks on real datasets containing tens or hundreds of taxa. Biologists are interested in clades, i.e. groups of monophyletic taxa, and these are usually represented by clusters in a rooted phylogenetic tree. The problem of computing an optimal rooted phylogenetic network from a set of clusters, is hard, in general. Indeed, even the problem of just determining whether a given network contains a given cluster is hard. Hence, some researchers have focused on topologically restricted classes of networks, such as galled trees and level-k networks, that are more tractable, but have the practical draw-back that a given set of clusters will usually not possess such a representation. Results: In this article, we argue that galled networks (a generalization of galled trees) provide a good trade-off between level of generality and tractability. Any set of clusters can be represented by some galled network and the question whether a cluster is contained in such a network is easy to solve. Although the computation of an optimal galled network involves successively solving instances of two different NP-complete problems, in practice our algorithm solves this problem exactly on large datasets containing hundreds of taxa and many reticulations in seconds, as illustrated by a dataset containing 279 prokaryotes. Availability: We provide a fast, robust and easy-to-use implementation of this work in version 2.0 of our tree-handling software Dendroscope, freely available from http://www.dendroscope.org. Contact: huson@informatik.uni-tuebingen.de PMID:19478021

  2. Role of Computer Assisted Instruction (CAI) in an Introductory Computer Concepts Course.

    ERIC Educational Resources Information Center

    Skudrna, Vincent J.

    1997-01-01

    Discusses the role of computer assisted instruction (CAI) in undergraduate education via a survey of related literature and specific applications. Describes an undergraduate computer concepts course and includes appendices of instructions, flowcharts, programs, sample student work in accounting, COBOL instructional model, decision logic in a…

  3. Adaptable multiple neural networks using evolutionary computation

    NASA Astrophysics Data System (ADS)

    Sohn, Sunghwan; Dagli, Cihan H.

    2002-03-01

    The architecture of an artificial neural network has a significant influence on its performance. For a given problem, the proper architecture is found by trial and error. This approach is time consuming and may not always produce the optimal network. In this reason, we can apply the evolutionary computation such as genetic algorithm to implement the automation of network's structure as well as the biological inspiration in neural networks to successfully adapt varying input environment. Moreover, we examine the performance of combining multiple evolving networks that are more likely to model the neurophysiology of the human brain. In the combining module, all individual networks or selected individual networks in the population are used. Also, the dynamic data set is used to provide the networks with diversity and generalization. In this model, each evolving individual network is designed to have a specific feature set and neuron connection links for given data. Then, the results are combined through the combining module to improve the generalization performance of the single network. The Iris and Austrian credit data are used in the experiment.

  4. Computing with structured connections networks. Technical report

    SciTech Connect

    Feldman, J.A.; Fanty, M.A.; Goddard, N.; Lynne, K.

    1987-04-01

    Rapid advances both in the neurosciences and in computer science are beginning to lead to a new interest in computational models linking animal brains and behavior. In computer science, there is a large and growing body of knowledge about parallel computation and another, largely separate, science of artificial intelligence. The idea of looking directly at massively parallel realizations of intelligent activity promises to be fruitful for the study of both natural and artificial computations. Much attention has been directed towards the biological implications of this interdisciplinary effort, but there are equally important relations with computational theory, hardware and software. This article focuses on the design and use of massively parallel computational models, particularly in artificial intelligence. Much of the recent work on massively parallel computation has been carried out by physicists and examines the emergent behavior of large, unstructured collections of computing units. We are more concerned with how one can design, realize and analyze networks that embody the specific computational structures needed to solve hard problems. Adaptation and learning are treated as ways to improve structured networks, not as a replacement for analysis and design.

  5. Computing matrix inversion with optical networks.

    PubMed

    Wu, Kan; Soci, Cesare; Shum, Perry Ping; Zheludev, Nikolay I

    2014-01-13

    With this paper we bring about a discussion on the computing potential of complex optical networks and provide experimental demonstration that an optical fiber network can be used as an analog processor to calculate matrix inversion. A 3x3 matrix is inverted as a proof-of-concept demonstration using a fiber network containing three nodes and operating at telecomm wavelength. For an NxN matrix, the overall solving time (including setting time of the matrix elements and calculation time of inversion) scales as O(N(2)), whereas matrix inversion by most advanced computer algorithms requires ~O(N(2.37)) computational time. For well-conditioned matrices, the error of the inversion performed optically is found to be around 3%, limited by the accuracy of measurement equipment. PMID:24514991

  6. Profiles of Motivated Self-Regulation in College Computer Science Courses: Differences in Major versus Required Non-Major Courses

    ERIC Educational Resources Information Center

    Shell, Duane F.; Soh, Leen-Kiat

    2013-01-01

    The goal of the present study was to utilize a profiling approach to understand differences in motivation and strategic self-regulation among post-secondary STEM students in major versus required non-major computer science courses. Participants were 233 students from required introductory computer science courses (194 men; 35 women; 4 unknown) at

  7. Profiles of Motivated Self-Regulation in College Computer Science Courses: Differences in Major versus Required Non-Major Courses

    ERIC Educational Resources Information Center

    Shell, Duane F.; Soh, Leen-Kiat

    2013-01-01

    The goal of the present study was to utilize a profiling approach to understand differences in motivation and strategic self-regulation among post-secondary STEM students in major versus required non-major computer science courses. Participants were 233 students from required introductory computer science courses (194 men; 35 women; 4 unknown) at…

  8. Meteorological Monitoring And Warning Computer Network

    NASA Technical Reports Server (NTRS)

    Evans, Randolph J.; Dianic, Allan V.; Moore, Lien N.

    1996-01-01

    Meteorological monitoring system (MMS) computer network tracks weather conditions and issues warnings when weather hazards are about to occur. Receives data from such meteorological instruments as wind sensors on towers and lightning detectors, and compares data with weather restrictions specified for outdoor activities. If weather violates restriction, network generates audible and visible alarms to alert people involved in activity. Also displays weather and toxic diffusion data and disseminates weather forecasts, advisories, and warnings to workstations.

  9. Systematic computational prediction of protein interaction networks.

    PubMed

    Lees, J G; Heriche, J K; Morilla, I; Ranea, J A; Orengo, C A

    2011-06-01

    Determining the network of physical protein associations is an important first step in developing mechanistic evidence for elucidating biological pathways. Despite rapid advances in the field of high throughput experiments to determine protein interactions, the majority of associations remain unknown. Here we describe computational methods for significantly expanding protein association networks. We describe methods for integrating multiple independent sources of evidence to obtain higher quality predictions and we compare the major publicly available resources available for experimentalists to use. PMID:21572181

  10. Anonymous Transactions in Computer Networks

    NASA Astrophysics Data System (ADS)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  11. DTW-MIC Coexpression Networks from Time-Course Data

    PubMed Central

    Riccadonna, Samantha; Jurman, Giuseppe; Visintainer, Roberto; Filosi, Michele; Furlanello, Cesare

    2016-01-01

    When modeling coexpression networks from high-throughput time course data, Pearson Correlation Coefficient (PCC) is one of the most effective and popular similarity functions. However, its reliability is limited since it cannot capture non-linear interactions and time shifts. Here we propose to overcome these two issues by employing a novel similarity function, Dynamic Time Warping Maximal Information Coefficient (DTW-MIC), combining a measure taking care of functional interactions of signals (MIC) and a measure identifying time lag (DTW). By using the Hamming-Ipsen-Mikhailov (HIM) metric to quantify network differences, the effectiveness of the DTW-MIC approach is demonstrated on a set of four synthetic and one transcriptomic datasets, also in comparison to TimeDelay ARACNE and Transfer Entropy. PMID:27031641

  12. Distributed neural computations for embedded sensor networks

    NASA Astrophysics Data System (ADS)

    Peckens, Courtney A.; Lynch, Jerome P.; Pei, Jin-Song

    2011-04-01

    Wireless sensing technologies have recently emerged as an inexpensive and robust method of data collection in a variety of structural monitoring applications. In comparison with cabled monitoring systems, wireless systems offer low-cost and low-power communication between a network of sensing devices. Wireless sensing networks possess embedded data processing capabilities which allow for data processing directly at the sensor, thereby eliminating the need for the transmission of raw data. In this study, the Volterra/Weiner neural network (VWNN), a powerful modeling tool for nonlinear hysteretic behavior, is decentralized for embedment in a network of wireless sensors so as to take advantage of each sensor's processing capabilities. The VWNN was chosen for modeling nonlinear dynamic systems because its architecture is computationally efficient and allows computational tasks to be decomposed for parallel execution. In the algorithm, each sensor collects it own data and performs a series of calculations. It then shares its resulting calculations with every other sensor in the network, while the other sensors are simultaneously exchanging their information. Because resource conservation is important in embedded sensor design, the data is pruned wherever possible to eliminate excessive communication between sensors. Once a sensor has its required data, it continues its calculations and computes a prediction of the system acceleration. The VWNN is embedded in the computational core of the Narada wireless sensor node for on-line execution. Data generated by a steel framed structure excited by seismic ground motions is used for validation of the embedded VWNN model.

  13. Computation of signal delays in RC networks

    NASA Technical Reports Server (NTRS)

    Hidalgo, Juan Carlos; Narendran, Paliath; Chaiken, Seth

    1993-01-01

    A model for signal delay computation in RC networks is presented. The strength of the paradigm is its generality and simplicity. The definition of delay is applicable to RC meshes with potential resistive attenuating paths to ground. The algorithms can also be applied to undriven circuits (static charge sharing) and circuits with initial charge. To compute the delays, each node in the network is explored locally to derive a system of sparse linear equations. The solutions of the system are delay values based on the Elmore time constant at each point in the circuit.

  14. On computer vision in wireless sensor networks.

    SciTech Connect

    Berry, Nina M.; Ko, Teresa H.

    2004-09-01

    Wireless sensor networks allow detailed sensing of otherwise unknown and inaccessible environments. While it would be beneficial to include cameras in a wireless sensor network because images are so rich in information, the power cost of transmitting an image across the wireless network can dramatically shorten the lifespan of the sensor nodes. This paper describe a new paradigm for the incorporation of imaging into wireless networks. Rather than focusing on transmitting images across the network, we show how an image can be processed locally for key features using simple detectors. Contrasted with traditional event detection systems that trigger an image capture, this enables a new class of sensors which uses a low power imaging sensor to detect a variety of visual cues. Sharing these features among relevant nodes cues specific actions to better provide information about the environment. We report on various existing techniques developed for traditional computer vision research which can aid in this work.

  15. A Computer-Based Education Approach to Electrical Network Theory: Lesson Development, Use and Evaluation.

    ERIC Educational Resources Information Center

    Grossel, Roger Louis

    This study investigated the use of the PLATO III computer assisted instruction (CAI) system to assist in the teaching of an electrical network theory course. It sought to: 1) identify the topics and teaching strategies most amenable to CAI system; 2) develop computer programs needed to teach those topics; 3) use, evaluate and service the programs;…

  16. Computational capabilities of random automata networks for reservoir computing

    NASA Astrophysics Data System (ADS)

    Snyder, David; Goudarzi, Alireza; Teuscher, Christof

    2013-04-01

    This paper underscores the conjecture that intrinsic computation is maximal in systems at the “edge of chaos”. We study the relationship between dynamics and computational capability in random Boolean networks (RBN) for reservoir computing (RC). RC is a computational paradigm in which a trained readout layer interprets the dynamics of an excitable component (called the reservoir) that is perturbed by external input. The reservoir is often implemented as a homogeneous recurrent neural network, but there has been little investigation into the properties of reservoirs that are discrete and heterogeneous. Random Boolean networks are generic and heterogeneous dynamical systems and here we use them as the reservoir. A RBN is typically a closed system; to use it as a reservoir we extend it with an input layer. As a consequence of perturbation, the RBN does not necessarily fall into an attractor. Computational capability in RC arises from a tradeoff between separability and fading memory of inputs. We find the balance of these properties predictive of classification power and optimal at critical connectivity. These results are relevant to the construction of devices which exploit the intrinsic dynamics of complex heterogeneous systems, such as biomolecular substrates.

  17. Advanced networks and computing in healthcare

    PubMed Central

    Ackerman, Michael

    2011-01-01

    As computing and network capabilities continue to rise, it becomes increasingly important to understand the varied applications for using them to provide healthcare. The objective of this review is to identify key characteristics and attributes of healthcare applications involving the use of advanced computing and communication technologies, drawing upon 45 research and development projects in telemedicine and other aspects of healthcare funded by the National Library of Medicine over the past 12 years. Only projects publishing in the professional literature were included in the review. Four projects did not publish beyond their final reports. In addition, the authors drew on their first-hand experience as project officers, reviewers and monitors of the work. Major themes in the corpus of work were identified, characterizing key attributes of advanced computing and network applications in healthcare. Advanced computing and network applications are relevant to a range of healthcare settings and specialties, but they are most appropriate for solving a narrower range of problems in each. Healthcare projects undertaken primarily to explore potential have also demonstrated effectiveness and depend on the quality of network service as much as bandwidth. Many applications are enabling, making it possible to provide service or conduct research that previously was not possible or to achieve outcomes in addition to those for which projects were undertaken. Most notable are advances in imaging and visualization, collaboration and sense of presence, and mobility in communication and information-resource use. PMID:21486877

  18. Reducing the diameters of computer networks

    NASA Technical Reports Server (NTRS)

    Bokhari, S. H.; Raza, A. D.

    1986-01-01

    Three methods of reducing the diameters of computer networks by adding additional processor to processor links under the constraint that no more than one I/O port be added to each processor are discussed. This is equivalent to adding edges to a given graph under the constraint that the degree of any node be increased, at most, by one.

  19. Multiple network alignment on quantum computers

    NASA Astrophysics Data System (ADS)

    Daskin, Anmer; Grama, Ananth; Kais, Sabre

    2014-12-01

    Comparative analyses of graph-structured datasets underly diverse problems. Examples of these problems include identification of conserved functional components (biochemical interactions) across species, structural similarity of large biomolecules, and recurring patterns of interactions in social networks. A large class of such analyses methods quantify the topological similarity of nodes across networks. The resulting correspondence of nodes across networks, also called node alignment, can be used to identify invariant subgraphs across the input graphs. Given graphs as input, alignment algorithms use topological information to assign a similarity score to each -tuple of nodes, with elements (nodes) drawn from each of the input graphs. Nodes are considered similar if their neighbors are also similar. An alternate, equivalent view of these network alignment algorithms is to consider the Kronecker product of the input graphs and to identify high-ranked nodes in the Kronecker product graph. Conventional methods such as PageRank and HITS (Hypertext-Induced Topic Selection) can be used for this purpose. These methods typically require computation of the principal eigenvector of a suitably modified Kronecker product matrix of the input graphs. We adopt this alternate view of the problem to address the problem of multiple network alignment. Using the phase estimation algorithm, we show that the multiple network alignment problem can be efficiently solved on quantum computers. We characterize the accuracy and performance of our method and show that it can deliver exponential speedups over conventional (non-quantum) methods.

  20. Multiple network alignment on quantum computers

    NASA Astrophysics Data System (ADS)

    Daskin, Anmer; Grama, Ananth; Kais, Sabre

    2014-09-01

    Comparative analyses of graph structured datasets underly diverse problems. Examples of these problems include identification of conserved functional components (biochemical interactions) across species, structural similarity of large biomolecules, and recurring patterns of interactions in social networks. A large class of such analyses methods quantify the topological similarity of nodes across networks. The resulting correspondence of nodes across networks, also called node alignment, can be used to identify invariant subgraphs across the input graphs. Given $k$ graphs as input, alignment algorithms use topological information to assign a similarity score to each $k$-tuple of nodes, with elements (nodes) drawn from each of the input graphs. Nodes are considered similar if their neighbors are also similar. An alternate, equivalent view of these network alignment algorithms is to consider the Kronecker product of the input graphs, and to identify high-ranked nodes in the Kronecker product graph. Conventional methods such as PageRank and HITS (Hypertext Induced Topic Selection) can be used for this purpose. These methods typically require computation of the principal eigenvector of a suitably modified Kronecker product matrix of the input graphs. We adopt this alternate view of the problem to address the problem of multiple network alignment. Using the phase estimation algorithm, we show that the multiple network alignment problem can be efficiently solved on quantum computers. We characterize the accuracy and performance of our method, and show that it can deliver exponential speedups over conventional (non-quantum) methods.

  1. Effects of Computer Course on Computer Self-Efficacy, Computer Attitudes and Achievements of Young Individuals in Siirt, Turkey

    ERIC Educational Resources Information Center

    elik, Halil Coskun

    2015-01-01

    The purpose of this study is to investigate the effects of computer courses on young individuals' computer self-efficacy, attitudes and achievement. The study group of this research included 60 unemployed young individuals (18-25 ages) in total; 30 in the experimental group and 30 in the control group. An experimental research model with

  2. Effects of Computer Course on Computer Self-Efficacy, Computer Attitudes and Achievements of Young Individuals in Siirt, Turkey

    ERIC Educational Resources Information Center

    Çelik, Halil Coskun

    2015-01-01

    The purpose of this study is to investigate the effects of computer courses on young individuals' computer self-efficacy, attitudes and achievement. The study group of this research included 60 unemployed young individuals (18-25 ages) in total; 30 in the experimental group and 30 in the control group. An experimental research model with…

  3. Multimedia computer support for a course in ground control

    SciTech Connect

    Summers, D.A.; Unal, A.

    1996-12-31

    A prototype multimedia compact disc (CD) was created using the facilities at the Rock Mechanics and Explosives Research Center (RMERC) of the University of Missouri-Rolla (UMR) to teach a portion of a course in Ground Control. Multimedia computers offer an environment where audio-visual presentations can be made in an interactive fashion. Together with relevant animation clips, video clips, and 3-D representations, the difficulties in describing mining processes and earth structures can be overcome. This paper describes the experience gained in preparing interactive multimedia lectures on computers. The hardware and software used in creating the sound commentary, 3-D graphics, animation clips, video clips, and movies are listed. The structure of the program and how interactivity was achieved is explained in detail. Such an instructional tool is not only an excellent supplement to regular courses but it also is an inexpensive and effective way of providing distance education for mining engineers working at remote locations scattered all over the country.

  4. Pedagogical Utilization and Assessment of the Statistic Online Computational Resource in Introductory Probability and Statistics Courses.

    PubMed

    Dinov, Ivo D; Sanchez, Juana; Christou, Nicolas

    2008-01-01

    Technology-based instruction represents a new recent pedagogical paradigm that is rooted in the realization that new generations are much more comfortable with, and excited about, new technologies. The rapid technological advancement over the past decade has fueled an enormous demand for the integration of modern networking, informational and computational tools with classical pedagogical instruments. Consequently, teaching with technology typically involves utilizing a variety of IT and multimedia resources for online learning, course management, electronic course materials, and novel tools of communication, engagement, experimental, critical thinking and assessment.The NSF-funded Statistics Online Computational Resource (SOCR) provides a number of interactive tools for enhancing instruction in various undergraduate and graduate courses in probability and statistics. These resources include online instructional materials, statistical calculators, interactive graphical user interfaces, computational and simulation applets, tools for data analysis and visualization. The tools provided as part of SOCR include conceptual simulations and statistical computing interfaces, which are designed to bridge between the introductory and the more advanced computational and applied probability and statistics courses. In this manuscript, we describe our designs for utilizing SOCR technology in instruction in a recent study. In addition, present the results of the effectiveness of using SOCR tools at two different course intensity levels on three outcome measures: exam scores, student satisfaction and choice of technology to complete assignments. Learning styles assessment was completed at baseline. We have used three very different designs for three different undergraduate classes. Each course included a treatment group, using the SOCR resources, and a control group, using classical instruction techniques. Our findings include marginal effects of the SOCR treatment per individual classes; however, pooling the results across all courses and sections, SOCR effects on the treatment groups were exceptionally robust and significant. Coupling these findings with a clear decrease in the variance of the quantitative examination measures in the treatment groups indicates that employing technology, like SOCR, in a sound pedagogical and scientific manner enhances overall the students' understanding and suggests better long-term knowledge retention. PMID:19750185

  5. Pedagogical Utilization and Assessment of the Statistic Online Computational Resource in Introductory Probability and Statistics Courses

    PubMed Central

    Dinov, Ivo D.; Sanchez, Juana; Christou, Nicolas

    2009-01-01

    Technology-based instruction represents a new recent pedagogical paradigm that is rooted in the realization that new generations are much more comfortable with, and excited about, new technologies. The rapid technological advancement over the past decade has fueled an enormous demand for the integration of modern networking, informational and computational tools with classical pedagogical instruments. Consequently, teaching with technology typically involves utilizing a variety of IT and multimedia resources for online learning, course management, electronic course materials, and novel tools of communication, engagement, experimental, critical thinking and assessment. The NSF-funded Statistics Online Computational Resource (SOCR) provides a number of interactive tools for enhancing instruction in various undergraduate and graduate courses in probability and statistics. These resources include online instructional materials, statistical calculators, interactive graphical user interfaces, computational and simulation applets, tools for data analysis and visualization. The tools provided as part of SOCR include conceptual simulations and statistical computing interfaces, which are designed to bridge between the introductory and the more advanced computational and applied probability and statistics courses. In this manuscript, we describe our designs for utilizing SOCR technology in instruction in a recent study. In addition, present the results of the effectiveness of using SOCR tools at two different course intensity levels on three outcome measures: exam scores, student satisfaction and choice of technology to complete assignments. Learning styles assessment was completed at baseline. We have used three very different designs for three different undergraduate classes. Each course included a treatment group, using the SOCR resources, and a control group, using classical instruction techniques. Our findings include marginal effects of the SOCR treatment per individual classes; however, pooling the results across all courses and sections, SOCR effects on the treatment groups were exceptionally robust and significant. Coupling these findings with a clear decrease in the variance of the quantitative examination measures in the treatment groups indicates that employing technology, like SOCR, in a sound pedagogical and scientific manner enhances overall the students’ understanding and suggests better long-term knowledge retention. PMID:19750185

  6. Accelerating commutation circuits in quantum computer networks

    NASA Astrophysics Data System (ADS)

    Jiang, Min; Huang, Xu; Chen, Xiaoping; Zhang, Zeng-ke

    2012-12-01

    In a high speed and packet-switched quantum computer network, a packet routing delay often leads to traffic jams, becoming a severe bottleneck for speeding up the transmission rate. Based on the delayed commutation circuit proposed in Phys. Rev. Lett. 97, 110502 (2006), we present an improved scheme for accelerating network transmission. For two more realistic scenarios, we utilize the characteristic of a quantum state to simultaneously implement a data switch and transmission that makes it possible to reduce the packet delay and route a qubit packet even before its address is determined. This circuit is further extended to the quantum network for the transmission of the unknown quantum information. The analysis demonstrates that quantum communication technology can considerably reduce the processing delay time and build faster and more efficient packet-switched networks.

  7. Advanced Scientific Computing Research Network Requirements

    SciTech Connect

    Bacon, Charles; Bell, Greg; Canon, Shane; Dart, Eli; Dattoria, Vince; Goodwin, Dave; Lee, Jason; Hicks, Susan; Holohan, Ed; Klasky, Scott; Lauzon, Carolyn; Rogers, Jim; Shipman, Galen; Skinner, David; Tierney, Brian

    2013-03-08

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the U.S. Department of Energy (DOE) Office of Science (SC), the single largest supporter of basic research in the physical sciences in the United States. In support of SC programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 25 years. In October 2012, ESnet and the Office of Advanced Scientific Computing Research (ASCR) of the DOE SC organized a review to characterize the networking requirements of the programs funded by the ASCR program office. The requirements identified at the review are summarized in the Findings section, and are described in more detail in the body of the report.

  8. Women Who Learn Computing Like Men: Different Gender Positions on Basic Computer Courses in Adult Education

    ERIC Educational Resources Information Center

    Salminen-Karlsson, Minna

    2009-01-01

    This article argues that research on gender and adult learning too often regards men and women as unified and separate groups, and does not take intra-gender variation into account. It presents one possible approach to address this problem, in a study of 142 women and 35 men attending basic computer courses in Swedish municipal adult education…

  9. Counseling Student Computer Competency Skills: Effects of Technology Course in Training.

    ERIC Educational Resources Information Center

    Edwards, Yolanda V.; Portman, Tarrell Awe Agahe; Bethea, James

    2002-01-01

    The focus of this article is to assess counseling student computer competency level as an effect of a one-credit hour introductory course in computer technology. Results indicate student computer competencies increased after completing the computer technology course in the following areas: ethics, assisting clients with internet searches,…

  10. A Textbook for a First Course in Computational Fluid Dynamics

    NASA Technical Reports Server (NTRS)

    Zingg, D. W.; Pulliam, T. H.; Nixon, David (Technical Monitor)

    1999-01-01

    This paper describes and discusses the textbook, Fundamentals of Computational Fluid Dynamics by Lomax, Pulliam, and Zingg, which is intended for a graduate level first course in computational fluid dynamics. This textbook emphasizes fundamental concepts in developing, analyzing, and understanding numerical methods for the partial differential equations governing the physics of fluid flow. Its underlying philosophy is that the theory of linear algebra and the attendant eigenanalysis of linear systems provides a mathematical framework to describe and unify most numerical methods in common use in the field of fluid dynamics. Two linear model equations, the linear convection and diffusion equations, are used to illustrate concepts throughout. Emphasis is on the semi-discrete approach, in which the governing partial differential equations (PDE's) are reduced to systems of ordinary differential equations (ODE's) through a discretization of the spatial derivatives. The ordinary differential equations are then reduced to ordinary difference equations (O(Delta)E's) using a time-marching method. This methodology, using the progression from PDE through ODE's to O(Delta)E's, together with the use of the eigensystems of tridiagonal matrices and the theory of O(Delta)E's, gives the book its distinctiveness and provides a sound basis for a deep understanding of fundamental concepts in computational fluid dynamics.

  11. The New Computers and Writing Course at the University of Texas at Austin: Context and Theory.

    ERIC Educational Resources Information Center

    Rouzie, Albert

    The new "Computers and Writing" course implemented by the division of rhetoric and composition at the University of Texas at Austin is an elective second-year writing course that satisfies the university's requirement for writing component courses. In this course, instructors and students generate and apply rhetorical terminology and strategies…

  12. Designing for Deeper Learning in a Blended Computer Science Course for Middle School Students

    ERIC Educational Resources Information Center

    Grover, Shuchi; Pea, Roy; Cooper, Stephen

    2015-01-01

    The focus of this research was to create and test an introductory computer science course for middle school. Titled "Foundations for Advancing Computational Thinking" (FACT), the course aims to prepare and motivate middle school learners for future engagement with algorithmic problem solving. FACT was also piloted as a seven-week course

  13. The dangers of heterogeneous network computing: heterogeneous networks considered harmful

    SciTech Connect

    Demmel, J.; Stanley, K.; Dongarra, J.; Hammarling, S.; Osstrouchov, S.

    1996-12-31

    This report addresses the issue of writing reliable numerical software for networks of heterogeneous computers. Much software has been written for distributed memory parallel computers and in principal such software could readily be ported to networks of machines, such as a collection of workstations connected by Ethernet, but if such a network is not homogeneous there are special challenges that need to be addressed. The symptoms can range from erroneous results returned without warning to deadlock. Some of the problems are straightforward to solve, but for others the solutions are not so obvious and indeed in some cases, such as the method of bisection which we shall discuss in the report, we have not yet decided upon a satisfactory solution that does not incur an unacceptable overhead. Making software robust on heterogeneous systems often requires additional communication. In this report we describe and illustrate the problems and, where possible, suggest solutions so that others may be aware of the potential pitfalls and either avoid them or, if that is not possible, ensure that their software is not used on heterogeneous networks.

  14. Spiking network simulation code for petascale computers

    PubMed Central

    Kunkel, Susanne; Schmidt, Maximilian; Eppler, Jochen M.; Plesser, Hans E.; Masumoto, Gen; Igarashi, Jun; Ishii, Shin; Fukai, Tomoki; Morrison, Abigail; Diesmann, Markus; Helias, Moritz

    2014-01-01

    Brain-scale networks exhibit a breathtaking heterogeneity in the dynamical properties and parameters of their constituents. At cellular resolution, the entities of theory are neurons and synapses and over the past decade researchers have learned to manage the heterogeneity of neurons and synapses with efficient data structures. Already early parallel simulation codes stored synapses in a distributed fashion such that a synapse solely consumes memory on the compute node harboring the target neuron. As petaflop computers with some 100,000 nodes become increasingly available for neuroscience, new challenges arise for neuronal network simulation software: Each neuron contacts on the order of 10,000 other neurons and thus has targets only on a fraction of all compute nodes; furthermore, for any given source neuron, at most a single synapse is typically created on any compute node. From the viewpoint of an individual compute node, the heterogeneity in the synaptic target lists thus collapses along two dimensions: the dimension of the types of synapses and the dimension of the number of synapses of a given type. Here we present a data structure taking advantage of this double collapse using metaprogramming techniques. After introducing the relevant scaling scenario for brain-scale simulations, we quantitatively discuss the performance on two supercomputers. We show that the novel architecture scales to the largest petascale supercomputers available today. PMID:25346682

  15. Parallel Computation of Unsteady Flows on a Network of Workstations

    NASA Technical Reports Server (NTRS)

    1997-01-01

    Parallel computation of unsteady flows requires significant computational resources. The utilization of a network of workstations seems an efficient solution to the problem where large problems can be treated at a reasonable cost. This approach requires the solution of several problems: 1) the partitioning and distribution of the problem over a network of workstation, 2) efficient communication tools, 3) managing the system efficiently for a given problem. Of course, there is the question of the efficiency of any given numerical algorithm to such a computing system. NPARC code was chosen as a sample for the application. For the explicit version of the NPARC code both two- and three-dimensional problems were studied. Again both steady and unsteady problems were investigated. The issues studied as a part of the research program were: 1) how to distribute the data between the workstations, 2) how to compute and how to communicate at each node efficiently, 3) how to balance the load distribution. In the following, a summary of these activities is presented. Details of the work have been presented and published as referenced.

  16. Fuzzy logic, neural networks, and soft computing

    NASA Technical Reports Server (NTRS)

    Zadeh, Lofti A.

    1994-01-01

    The past few years have witnessed a rapid growth of interest in a cluster of modes of modeling and computation which may be described collectively as soft computing. The distinguishing characteristic of soft computing is that its primary aims are to achieve tractability, robustness, low cost, and high MIQ (machine intelligence quotient) through an exploitation of the tolerance for imprecision and uncertainty. Thus, in soft computing what is usually sought is an approximate solution to a precisely formulated problem or, more typically, an approximate solution to an imprecisely formulated problem. A simple case in point is the problem of parking a car. Generally, humans can park a car rather easily because the final position of the car is not specified exactly. If it were specified to within, say, a few millimeters and a fraction of a degree, it would take hours or days of maneuvering and precise measurements of distance and angular position to solve the problem. What this simple example points to is the fact that, in general, high precision carries a high cost. The challenge, then, is to exploit the tolerance for imprecision by devising methods of computation which lead to an acceptable solution at low cost. By its nature, soft computing is much closer to human reasoning than the traditional modes of computation. At this juncture, the major components of soft computing are fuzzy logic (FL), neural network theory (NN), and probabilistic reasoning techniques (PR), including genetic algorithms, chaos theory, and part of learning theory. Increasingly, these techniques are used in combination to achieve significant improvement in performance and adaptability. Among the important application areas for soft computing are control systems, expert systems, data compression techniques, image processing, and decision support systems. It may be argued that it is soft computing, rather than the traditional hard computing, that should be viewed as the foundation for artificial intelligence. In the years ahead, this may well become a widely held position.

  17. Criteria development for upgrading computer networks

    NASA Technical Reports Server (NTRS)

    Efe, Kemal

    1995-01-01

    Being an infrastructure system, the computer network has a fundamental role in the day to day activities of personnel working at KSC. It is easily appreciated that the lack of 'satisfactory' network performance can have a high 'cost' for KSC. Yet, this seemingly obvious concept is quite difficult to demonstrate. At what point do we say that performance is below the lowest tolerable level? How do we know when the 'cost' of using the system at the current level of degraded performance exceeds the cost of upgrading it? In this research, we consider the cost and performance factors that may have an effect in decision making in regards to upgrading computer networks. Cost factors are detailed in terms of 'direct costs' and 'subjective costs'. Performance factors are examined in terms of 'required performance' and 'offered performance.' Required performance is further examined by presenting a methodology for trend analysis based on applying interpolation methods to observed traffic levels. Offered performance levels are analyzed by deriving simple equations to evaluate network performance. The results are evaluated in the light of recommended upgrade policies currently in use for telephone exchange systems, similarities and differences between the two types of services are discussed.

  18. A needs assessment for a graduate level course in optical networking

    NASA Astrophysics Data System (ADS)

    Zhang, Qi; Reisslein, Jana; Klein, James; Reisslein, Martin

    2003-10-01

    To explore the need for a graduate level engineering course in optical networking, a needs assessment consisting of (i) an investigation of 14 existing optical networking courses, (ii) an analysis of online surveys among the networking community and the ASU electrical engineering department, (iii) faculty interviews, and (iv) focus groups was conducted. Survey responses from a total of 61 respondents were received and analyzed. The results support the need for a graduate level course in optical networking. Our analyses indicate that a graduate course in optical networking should (i) focus on the basic mechanisms and current trends in optical networking, (ii) be based on a text book and instructor slides combined with collections of examples and problems. Regarding the optimal delivery method it was found that current students and faculty strongly prefer face-to-face delivery complemented by on-line readings and assignments, whereas working engineering professionals are more open to the idea of online courses.

  19. Computer network defense through radial wave functions

    NASA Astrophysics Data System (ADS)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  20. Using satellite communications for a mobile computer network

    NASA Technical Reports Server (NTRS)

    Wyman, Douglas J.

    1993-01-01

    The topics discussed include the following: patrol car automation, mobile computer network, network requirements, network design overview, MCN mobile network software, MCN hub operation, mobile satellite software, hub satellite software, the benefits of patrol car automation, the benefits of satellite mobile computing, and national law enforcement satellite.

  1. Computer Based Collaborative Problem Solving for Introductory Courses in Physics

    NASA Astrophysics Data System (ADS)

    Ilie, Carolina; Lee, Kevin

    2010-03-01

    We discuss collaborative problem solving computer-based recitation style. The course is designed by Lee [1], and the idea was proposed before by Christian, Belloni and Titus [2,3]. The students find the problems on a web-page containing simulations (physlets) and they write the solutions on an accompanying worksheet after discussing it with a classmate. Physlets have the advantage of being much more like real-world problems than textbook problems. We also compare two protocols for web-based instruction using simulations in an introductory physics class [1]. The inquiry protocol allowed students to control input parameters while the worked example protocol did not. We will discuss which of the two methods is more efficient in relation to Scientific Discovery Learning and Cognitive Load Theory. 1. Lee, Kevin M., Nicoll, Gayle and Brooks, Dave W. (2004). ``A Comparison of Inquiry and Worked Example Web-Based Instruction Using Physlets'', Journal of Science Education and Technology 13, No. 1: 81-88. 2. Christian, W., and Belloni, M. (2001). Physlets: Teaching Physics With Interactive Curricular Material, Prentice Hall, Englewood Cliffs, NJ. 3. Christian,W., and Titus,A. (1998). ``Developing web-based curricula using Java Physlets.'' Computers in Physics 12: 227--232.

  2. Computational Fact Checking from Knowledge Networks

    PubMed Central

    Ciampaglia, Giovanni Luca; Shiralkar, Prashant; Rocha, Luis M.; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

    2015-01-01

    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation. PMID:26083336

  3. Computational Fact Checking from Knowledge Networks.

    PubMed

    Ciampaglia, Giovanni Luca; Shiralkar, Prashant; Rocha, Luis M; Bollen, Johan; Menczer, Filippo; Flammini, Alessandro

    2015-01-01

    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation. PMID:26083336

  4. Computational drug repositioning through heterogeneous network clustering

    PubMed Central

    2013-01-01

    Background Given the costly and time consuming process and high attrition rates in drug discovery and development, drug repositioning or drug repurposing is considered as a viable strategy both to replenish the drying out drug pipelines and to surmount the innovation gap. Although there is a growing recognition that mechanistic relationships from molecular to systems level should be integrated into drug discovery paradigms, relatively few studies have integrated information about heterogeneous networks into computational drug-repositioning candidate discovery platforms. Results Using known disease-gene and drug-target relationships from the KEGG database, we built a weighted disease and drug heterogeneous network. The nodes represent drugs or diseases while the edges represent shared gene, biological process, pathway, phenotype or a combination of these features. We clustered this weighted network to identify modules and then assembled all possible drug-disease pairs (putative drug repositioning candidates) from these modules. We validated our predictions by testing their robustness and evaluated them by their overlap with drug indications that were either reported in published literature or investigated in clinical trials. Conclusions Previous computational approaches for drug repositioning focused either on drug-drug and disease-disease similarity approaches whereas we have taken a more holistic approach by considering drug-disease relationships also. Further, we considered not only gene but also other features to build the disease drug networks. Despite the relative simplicity of our approach, based on the robustness analyses and the overlap of some of our predictions with drug indications that are under investigation, we believe our approach could complement the current computational approaches for drug repositioning candidate discovery. PMID:24564976

  5. Evaluating the Effectiveness of Collaborative Computer-Intensive Projects in an Undergraduate Psychometrics Course

    ERIC Educational Resources Information Center

    Barchard, Kimberly A.; Pace, Larry A.

    2010-01-01

    Undergraduate psychometrics classes often use computer-intensive active learning projects. However, little research has examined active learning or computer-intensive projects in psychometrics courses. We describe two computer-intensive collaborative learning projects used to teach the design and evaluation of psychological tests. Course

  6. Path Not Found: Disparities in Access to Computer Science Courses in California High Schools

    ERIC Educational Resources Information Center

    Martin, Alexis; McAlear, Frieda; Scott, Allison

    2015-01-01

    "Path Not Found: Disparities in Access to Computer Science Courses in California High Schools" exposes one of the foundational causes of underrepresentation in computing: disparities in access to computer science courses in California's public high schools. This report provides new, detailed data on these disparities by student body…

  7. Using Microcomputer Simulations in the Classroom: Examples from Undergraduate and Faculty Computer Literacy Courses.

    ERIC Educational Resources Information Center

    Hart, Jeffrey A.

    Examples of the use of computer simulations in two undergraduate courses, (American Foreign Policy and Introduction to International Politics), and a faculty computer literacy course on simulations and artificial intelligence, are provided in this compilation of various instructional items. A list of computer simulations available for various…

  8. Massively Open Online Course for Educators (MOOC-Ed) Network Dataset

    ERIC Educational Resources Information Center

    Kellogg, Shaun; Edelmann, Achim

    2015-01-01

    This paper presents the Massively Open Online Course for Educators (MOOC-Ed) network dataset. It entails information on two online communication networks resulting from two consecutive offerings of the MOOC called "The Digital Learning Transition in K-12 Schools" in spring and fall 2013. The courses were offered to educators from the USA…

  9. Massively Open Online Course for Educators (MOOC-Ed) Network Dataset

    ERIC Educational Resources Information Center

    Kellogg, Shaun; Edelmann, Achim

    2015-01-01

    This paper presents the Massively Open Online Course for Educators (MOOC-Ed) network dataset. It entails information on two online communication networks resulting from two consecutive offerings of the MOOC called "The Digital Learning Transition in K-12 Schools" in spring and fall 2013. The courses were offered to educators from the USA

  10. Computed tomography-enhanced anatomy course using enterprise visualization.

    PubMed

    May, Hila; Cohen, Haim; Medlej, Bahaa; Kornreich, Liora; Peled, Nathan; Hershkovitz, Israel

    2013-01-01

    Rapid changes in medical knowledge are forcing continuous adaptation of the basic science courses in medical schools. This article discusses a three-year experience developing a new Computed Tomography (CT)-based anatomy curriculum at the Sackler School of Medicine, Tel Aviv University, including describing the motivations and reasoning for the new curriculum, the CT-based learning system itself, practical examples of visual dissections, and student assessments of the new curriculum. At the heart of this new curriculum is the emphasis on studying anatomy by navigating inside the bodies of various living individuals utilizing a CT viewer. To assess the students' experience with the new CT-based learning method, an anonymous questionnaire was administered at the end of the course for three consecutive academic years: 2008/2009, 2009/2010, 2010/2011. Based upon the results, modifications were made to the curriculum in the summers of 2009 and 2010. Results showed that: (1) during these three years the number of students extensively using the CT system quadrupled (from 11% to 46%); (2) students' satisfaction from radiologists involvement increased by 150%; and (3) student appreciation of the CT-based learning method significantly increased (from 13% to 68%). It was concluded that discouraging results (mainly negative feedback from students) during the first years and a priori opposition from the teaching staff should not weaken efforts to develop new teaching methods in the field of anatomy. Incorporating a new curriculum requires time and patience. Student and staff satisfaction, along with utilization of the new system, will increase with the improvement of impeding factors. PMID:23401203

  11. Computer Business Applications I. Course One. Information Systems Curriculum.

    ERIC Educational Resources Information Center

    O'Neil, Sharon Lund; Everett, Donna R.

    This course is the first of seven in the Information Systems curriculum. The purpose of the course is to set the foundation for the curriculum. The content builds on the existing knowledge of the information processing cycle through hands-on applications and review of terminology, vocabulary, and concepts. An overview of the course sets forth the…

  12. Artificial Kohonen's neural networks for computer capillarometry

    NASA Astrophysics Data System (ADS)

    Doncow, Sergey; Orbachevskyi, Leonid; Birukow, Valentin; Stepanova, Nina V.

    1998-04-01

    Analysis of disorders in microhemocirculation appearing during development of various genesis pathological processes allows to manifest their start-up and pathogenic mechanisms. Numerical estimation of capillary and arteriolar-veinular bed parameters gives a possibility to predict development of these states. Automatically controlled estimation of even simple parameters of microhemocirculation bed, such as vessel length in the eye conjuctiva, their amount, size, winding, etc., allows to speak about a new method in the express diagnostics of computer capillarometry. The present work is devoted to the methods of automated determination of microvessel length. The problem is solved by application of one-dimension Kohonen's networks for adaptive uniform piecewise approximation of capillary images. Kohonen's units are the approximation points, and their position is set during the self-organization of the neural network.

  13. Profiles of Motivated Self-Regulation in College Computer Science Courses: Differences in Major versus Required Non-Major Courses

    NASA Astrophysics Data System (ADS)

    Shell, Duane F.; Soh, Leen-Kiat

    2013-12-01

    The goal of the present study was to utilize a profiling approach to understand differences in motivation and strategic self-regulation among post-secondary STEM students in major versus required non-major computer science courses. Participants were 233 students from required introductory computer science courses (194 men; 35 women; 4 unknown) at a large Midwestern state university. Cluster analysis identified five profiles: (1) a strategic profile of a highly motivated by-any-means good strategy user; (2) a knowledge-building profile of an intrinsically motivated autonomous, mastery-oriented student; (3) a surface learning profile of a utility motivated minimally engaged student; (4) an apathetic profile of an amotivational disengaged student; and (5) a learned helpless profile of a motivated but unable to effectively self-regulate student. Among CS majors and students in courses in their major field, the strategic and knowledge-building profiles were the most prevalent. Among non-CS majors and students in required non-major courses, the learned helpless, surface learning, and apathetic profiles were the most prevalent. Students in the strategic and knowledge-building profiles had significantly higher retention of computational thinking knowledge than students in other profiles. Students in the apathetic and surface learning profiles saw little instrumentality of the course for their future academic and career objectives. Findings show that students in STEM fields taking required computer science courses exhibit the same constellation of motivated strategic self-regulation profiles found in other post-secondary and K-12 settings.

  14. Some queuing network models of computer systems

    NASA Technical Reports Server (NTRS)

    Herndon, E. S.

    1980-01-01

    Queuing network models of a computer system operating with a single workload type are presented. Program algorithms are adapted for use on the Texas Instruments SR-52 programmable calculator. By slightly altering the algorithm to process the G and H matrices row by row instead of column by column, six devices and an unlimited job/terminal population could be handled on the SR-52. Techniques are also introduced for handling a simple load dependent server and for studying interactive systems with fixed multiprogramming limits.

  15. Program Predicts Time Courses of Human/Computer Interactions

    NASA Technical Reports Server (NTRS)

    Vera, Alonso; Howes, Andrew

    2005-01-01

    CPM X is a computer program that predicts sequences of, and amounts of time taken by, routine actions performed by a skilled person performing a task. Unlike programs that simulate the interaction of the person with the task environment, CPM X predicts the time course of events as consequences of encoded constraints on human behavior. The constraints determine which cognitive and environmental processes can occur simultaneously and which have sequential dependencies. The input to CPM X comprises (1) a description of a task and strategy in a hierarchical description language and (2) a description of architectural constraints in the form of rules governing interactions of fundamental cognitive, perceptual, and motor operations. The output of CPM X is a Program Evaluation Review Technique (PERT) chart that presents a schedule of predicted cognitive, motor, and perceptual operators interacting with a task environment. The CPM X program allows direct, a priori prediction of skilled user performance on complex human-machine systems, providing a way to assess critical interfaces before they are deployed in mission contexts.

  16. Telecommunications/Networking. Course Four. Information Systems Curriculum.

    ERIC Educational Resources Information Center

    O'Neil, Sharon Lund; Everett, Donna R.

    This course is the fourth of seven in the Information Systems curriculum. The purpose of the course is to review data, text, graphics, and voice communications technology. It includes an overview of telecommunications technology. An overview of the course sets forth the condition and performance standard for each of the five task areas in the…

  17. Deterministic Function Computation with Chemical Reaction Networks*

    PubMed Central

    Chen, Ho-Lin; Doty, David; Soloveichik, David

    2013-01-01

    Chemical reaction networks (CRNs) formally model chemistry in a well-mixed solution. CRNs are widely used to describe information processing occurring in natural cellular regulatory networks, and with upcoming advances in synthetic biology, CRNs are a promising language for the design of artificial molecular control circuitry. Nonetheless, despite the widespread use of CRNs in the natural sciences, the range of computational behaviors exhibited by CRNs is not well understood. CRNs have been shown to be efficiently Turing-universal (i.e., able to simulate arbitrary algorithms) when allowing for a small probability of error. CRNs that are guaranteed to converge on a correct answer, on the other hand, have been shown to decide only the semilinear predicates (a multi-dimensional generalization of “eventually periodic” sets). We introduce the notion of function, rather than predicate, computation by representing the output of a function f : ℕk → ℕl by a count of some molecular species, i.e., if the CRN starts with x1, …, xk molecules of some “input” species X1, …, Xk, the CRN is guaranteed to converge to having f(x1, …, xk) molecules of the “output” species Y1, …, Yl. We show that a function f : ℕk → ℕl is deterministically computed by a CRN if and only if its graph {(x, y) ∈ ℕk × ℕl ∣ f(x) = y} is a semilinear set. Finally, we show that each semilinear function f (a function whose graph is a semilinear set) can be computed by a CRN on input x in expected time O(polylog ∥x∥1). PMID:25383068

  18. Building a Sense of Community for Text-Based Computer-Mediated Communication Courses

    ERIC Educational Resources Information Center

    Yang, Harrison Hao; Liu, Yuliang

    2008-01-01

    Building a strong sense of community in text-based computer-mediated communication courses can be a challenge to instructors. This article presents how a sound practical approach called STEP is implemented into one text-based fully online course and one hybrid course at a university in the northeastern region of the United States. Students'

  19. Techniques for Developing a Syllabus/Website for a Computer Mediated Learning (CML) Course.

    ERIC Educational Resources Information Center

    Bull, Kay Sather; Kimball, Sarah; Stansberry, Susan

    Computer mediated learning (CML) courses can overcome the temporal and spatial obstacles of isolated commuter students with busy schedules. Whether presented online or as an add-on to an on-campus course, the CML course needs a good syllabus. This paper discusses components of a CML syllabus and online activities for students. Typical components…

  20. Some Specifications for a Computer-Oriented First Course in Electrical Engineering.

    ERIC Educational Resources Information Center

    Commission on Engineering Education, Washington, DC.

    Reported are specifications for a computer-oriented first course in electrical engineering giving new direction to the development of texts and alternative courses of study. Guidelines for choice of topics, a statement of fundamental concepts, pitfalls to avoid, and some sample course outlines are given. The study of circuits through computer…

  1. "The 'Mouse' That Roared": Using Computer Labs for Basic Course Group Projects.

    ERIC Educational Resources Information Center

    O'Connor, Penny; Chatham-Carpenter, April

    One of the challenges in teaching a hybrid Basic Course in Communication is the wide variety of topics that can be covered in one semester. Two basic course instructors have found that their recently opened Basic Course computer lab gave them the opportunity to develop interdisciplinary assignments to help more efficiently address various…

  2. Enhancing Basic Course Values and Reducing Problems with a Computer-Assisted Student Assessment Center.

    ERIC Educational Resources Information Center

    Babich, Roger M.

    To alleviate problems with course content, procedure, and philosophy identified by basic communication skills students and faculty, the University of Oklahoma developed a computer assisted Student Assessment Center (SAC) as a basic communication course adjunct. The SAC allows students from all sections of the course to take each of the four unit…

  3. Quantum computation over the butterfly network

    SciTech Connect

    Soeda, Akihito; Kinjo, Yoshiyuki; Turner, Peter S.; Murao, Mio

    2011-07-15

    In order to investigate distributed quantum computation under restricted network resources, we introduce a quantum computation task over the butterfly network where both quantum and classical communications are limited. We consider deterministically performing a two-qubit global unitary operation on two unknown inputs given at different nodes, with outputs at two distinct nodes. By using a particular resource setting introduced by M. Hayashi [Phys. Rev. A 76, 040301(R) (2007)], which is capable of performing a swap operation by adding two maximally entangled qubits (ebits) between the two input nodes, we show that unitary operations can be performed without adding any entanglement resource, if and only if the unitary operations are locally unitary equivalent to controlled unitary operations. Our protocol is optimal in the sense that the unitary operations cannot be implemented if we relax the specifications of any of the channels. We also construct protocols for performing controlled traceless unitary operations with a 1-ebit resource and for performing global Clifford operations with a 2-ebit resource.

  4. Visualization Techniques for Computer Network Defense

    SciTech Connect

    Beaver, Justin M; Steed, Chad A; Patton, Robert M; Cui, Xiaohui; Schultz, Matthew A

    2011-01-01

    Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.

  5. Visualization techniques for computer network defense

    NASA Astrophysics Data System (ADS)

    Beaver, Justin M.; Steed, Chad A.; Patton, Robert M.; Cui, Xiaohui; Schultz, Matthew

    2011-06-01

    Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.

  6. A Survey and Evaluation of Simulators Suitable for Teaching Courses in Computer Architecture and Organization

    ERIC Educational Resources Information Center

    Nikolic, B.; Radivojevic, Z.; Djordjevic, J.; Milutinovic, V.

    2009-01-01

    Courses in Computer Architecture and Organization are regularly included in Computer Engineering curricula. These courses are usually organized in such a way that students obtain not only a purely theoretical experience, but also a practical understanding of the topics lectured. This practical work is usually done in a laboratory using simulators…

  7. Making History Come Alive: Designing and Using Computer Simulations in U.S. History Survey Courses.

    ERIC Educational Resources Information Center

    Semonche, John E.

    1989-01-01

    Reflects on the thought and process involved in the development of a series of computer simulations used to help teach a two-semester U.S. history course. Lists common elements in the simulations, describes the simulations, and responds to criticisms. Discusses student reaction to the use of computer simulations in a history course. (LS)

  8. Computer Controlled Test Systems. Introduction. A Course Based on the IEEE 488 Bus.

    ERIC Educational Resources Information Center

    Herrmann, Eric J.

    An introductory course in computer automated tests and measurement systems based on the International Test Instrument-Computer Interface Standard, the IEEE (Institute of Electrical and Electronics Engineers)-488, is presented in this study guide. This course is designed to: (1) introduce the electronics engineering technician to the functional…

  9. THE DEVELOPMENT AND PRESENTATION OF FOUR COLLEGE COURSES BY COMPUTER TELEPROCESSING. FINAL REPORT.

    ERIC Educational Resources Information Center

    MITZEL, HAROLD E.

    THIS IS A FINAL REPORT ON THE DEVELOPMENT AND PRESENTATION OF FOUR COLLEGE COURSES BY COMPUTER TELEPROCESSING FROM APRIL 1964 TO JUNE 1967. IT OUTLINES THE PROGRESS MADE TOWARDS THE PREPARATION, DEVELOPMENT, AND EVALUATION OF MATERIALS FOR COMPUTER PRESENTATION OF COURSES IN AUDIOLOGY, MANAGEMENT ACCOUNTING, ENGINEERING ECONOMICS, AND MODERN…

  10. Designing for Deeper Learning in a Blended Computer Science Course for Middle School Students

    ERIC Educational Resources Information Center

    Grover, Shuchi; Pea, Roy; Cooper, Stephen

    2015-01-01

    The focus of this research was to create and test an introductory computer science course for middle school. Titled "Foundations for Advancing Computational Thinking" (FACT), the course aims to prepare and motivate middle school learners for future engagement with algorithmic problem solving. FACT was also piloted as a seven-week course…

  11. A Computer Literacy Course at Colleges of Education: What and How.

    ERIC Educational Resources Information Center

    Leh, Amy S. C.

    A report recently released by the National Council for Accreditation of Teacher Education (NCATE) promotes the use of technology in colleges of education. To respond to the professional call, several teacher education programs have been offering computer courses to help the future teachers. This research examined one of the computer courses, an…

  12. Computational functions in biochemical reaction networks.

    PubMed Central

    Arkin, A; Ross, J

    1994-01-01

    In prior work we demonstrated the implementation of logic gates, sequential computers (universal Turing machines), and parallel computers by means of the kinetics of chemical reaction mechanisms. In the present article we develop this subject further by first investigating the computational properties of several enzymatic (single and multiple) reaction mechanisms: we show their steady states are analogous to either Boolean or fuzzy logic gates. Nearly perfect digital function is obtained only in the regime in which the enzymes are saturated with their substrates. With these enzymatic gates, we construct combinational chemical networks that execute a given truth-table. The dynamic range of a network's output is strongly affected by "input/output matching" conditions among the internal gate elements. We find a simple mechanism, similar to the interconversion of fructose-6-phosphate between its two bisphosphate forms (fructose-1,6-bisphosphate and fructose-2,6-bisphosphate), that functions analogously to an AND gate. When the simple model is supplanted with one in which the enzyme rate laws are derived from experimental data, the steady state of the mechanism functions as an asymmetric fuzzy aggregation operator with properties akin to a fuzzy AND gate. The qualitative behavior of the mechanism does not change when situated within a large model of glycolysis/gluconeogenesis and the TCA cycle. The mechanism, in this case, switches the pathway's mode from glycolysis to gluconeogenesis in response to chemical signals of low blood glucose (cAMP) and abundant fuel for the TCA cycle (acetyl coenzyme A). Images FIGURE 3 FIGURE 4 FIGURE 5 FIGURE 7 FIGURE 10 FIGURE 12 FIGURE 13 FIGURE 14 FIGURE 15 FIGURE 16 PMID:7948674

  13. Computer Modeling of Planetary Surface Temperatures in Introductory Astronomy Courses

    NASA Astrophysics Data System (ADS)

    Barker, Timothy; Goodman, J.

    2013-01-01

    Barker, T., and Goodman, J. C., Wheaton College, Norton, MA Computer modeling is an essential part of astronomical research, and so it is important that students be exposed to its powers and limitations in the first (and, perhaps, only) astronomy course they take in college. Building on the ideas of Walter Robinson (“Modeling Dynamic Systems,” Springer, 2002) we have found that STELLA software (ISEE Systems) allows introductory astronomy students to do sophisticated modeling by the end of two classes of instruction, with no previous experience in computer programming or calculus. STELLA’s graphical interface allows students to visualize systems in terms of “flows” in and out of “stocks,” avoiding the need to invoke differential equations. Linking flows and stocks allows feedback systems to be constructed. Students begin by building an easily understood system: a leaky bucket. This is a simple negative feedback system in which the volume in the bucket (a “stock”) depends on a fixed inflow rate and an outflow that increases in proportion to the volume in the bucket. Students explore how changing inflow rate and feedback parameters affect the steady-state volume and equilibration time of the system. This model is completed within a 50-minute class meeting. In the next class, students are given an analogous but more sophisticated problem: modeling a planetary surface temperature (“stock”) that depends on the “flow” of energy from the Sun, the planetary albedo, the outgoing flow of infrared radiation from the planet’s surface, and the infrared return from the atmosphere. Students then compare their STELLA model equilibrium temperatures to observed planetary temperatures, which agree with model ones for worlds without atmospheres, but give underestimates for planets with atmospheres, thus introducing students to the concept of greenhouse warming. We find that if we give the students part of this model at the start of a 50-minute class they are able to build the rest of the model and run planetary simulations by the end of class.

  14. Computational classifiers for predicting the short-term course of Multiple sclerosis

    PubMed Central

    2011-01-01

    Background The aim of this study was to assess the diagnostic accuracy (sensitivity and specificity) of clinical, imaging and motor evoked potentials (MEP) for predicting the short-term prognosis of multiple sclerosis (MS). Methods We obtained clinical data, MRI and MEP from a prospective cohort of 51 patients and 20 matched controls followed for two years. Clinical end-points recorded were: 1) expanded disability status scale (EDSS), 2) disability progression, and 3) new relapses. We constructed computational classifiers (Bayesian, random decision-trees, simple logistic-linear regression-and neural networks) and calculated their accuracy by means of a 10-fold cross-validation method. We also validated our findings with a second cohort of 96 MS patients from a second center. Results We found that disability at baseline, grey matter volume and MEP were the variables that better correlated with clinical end-points, although their diagnostic accuracy was low. However, classifiers combining the most informative variables, namely baseline disability (EDSS), MRI lesion load and central motor conduction time (CMCT), were much more accurate in predicting future disability. Using the most informative variables (especially EDSS and CMCT) we developed a neural network (NNet) that attained a good performance for predicting the EDSS change. The predictive ability of the neural network was validated in an independent cohort obtaining similar accuracy (80%) for predicting the change in the EDSS two years later. Conclusions The usefulness of clinical variables for predicting the course of MS on an individual basis is limited, despite being associated with the disease course. By training a NNet with the most informative variables we achieved a good accuracy for predicting short-term disability. PMID:21649880

  15. Reducing the diameters of computer networks

    SciTech Connect

    Bokhari, S.H.; Raza, A.D.

    1986-08-01

    The authors discuss three methods of reducing the diameters of computer networks by adding additional processor to processor links under the constraint that no more than one I/O port be added to each processor. This is equivalent to adding edges to a given graph under the constraint that the degree of any node be increased, at most, by one. 1) A tree of N nodes may be augmented such that the resulting graph has diameter no greater than 4(log/sub 2/((N + 2)/3)) - 2. This O(N/sup 2/) algorithms can be applied to any spanning tree of a connected graph to reduce the diameter of that graph to O(log N). 2) Given a binary tree T and a chain C of N nodes each, C may be augmented to produce C' so that T is a subgraph of C'. This algorithms is O(N) and may be used to produce augmented chains or rings that have diameter no greater than 2(log/sub 2/((N + 2)/3)) and are planar. 3) Any rectangular two-dimensional 4 (8) nearest-neighbor array of size N = 2/sup k/ may be augmented so that it can emulate a single-stage shuffle-exchange network of size N/2 in 3 (2) time steps.

  16. Time-course gene profiling and networks in demethylated retinoblastoma cell line

    PubMed Central

    Malusa, Federico; Taranta, Monia; Zaki, Nazar; Cinti, Caterina; Capobianco, Enrico

    2015-01-01

    Retinoblastoma, a very aggressive cancer of the developing retina, initiatiates by the biallelic loss of RB1 gene, and progresses very quickly following RB1 inactivation. While its genome is stable, multiple pathways are deregulated, also epigenetically. After reviewing the main findings in relation with recently validated markers, we propose an integrative bioinformatics approach to include in the previous group new markers obtained from the analysis of a single cell line subject to epigenetic treatment. In particular, differentially expressed genes are identified from time course microarray experiments on the WERI-RB1 cell line treated with 5-Aza-2′-deoxycytidine (decitabine; DAC). By inducing demethylation of CpG island in promoter genes that are involved in biological processes, for instance apoptosis, we performed the following main integrative analysis steps: i) Gene expression profiling at 48h, 72h and 96h after DAC treatment; ii) Time differential gene co-expression networks and iii) Context-driven marker association (transcriptional factor regulated protein networks, master regulatory paths). The observed DAC-driven temporal profiles and regulatory connectivity patterns are obtained by the application of computational tools, with support from curated literature. It is worth emphasizing the capacity of networks to reconcile multi-type evidences, thus generating testable hypotheses made available by systems scale predictive inference power. Despite our small experimental setting, we propose through such integrations valuable impacts of epigenetic treatment in terms of gene expression measurements, and then validate evidenced apoptotic effects. PMID:26143641

  17. Time-course gene profiling and networks in demethylated retinoblastoma cell line.

    PubMed

    Malusa, Federico; Taranta, Monia; Zaki, Nazar; Cinti, Caterina; Capobianco, Enrico

    2015-09-15

    Retinoblastoma, a very aggressive cancer of the developing retina, initiatiates by the biallelic loss of RB1 gene, and progresses very quickly following RB1 inactivation. While its genome is stable, multiple pathways are deregulated, also epigenetically. After reviewing the main findings in relation with recently validated markers, we propose an integrative bioinformatics approach to include in the previous group new markers obtained from the analysis of a single cell line subject to epigenetic treatment. In particular, differentially expressed genes are identified from time course microarray experiments on the WERI-RB1 cell line treated with 5-Aza-2'-deoxycytidine (decitabine; DAC). By inducing demethylation of CpG island in promoter genes that are involved in biological processes, for instance apoptosis, we performed the following main integrative analysis steps: i) Gene expression profiling at 48h, 72h and 96h after DAC treatment; ii) Time differential gene co-expression networks and iii) Context-driven marker association (transcriptional factor regulated protein networks, master regulatory paths). The observed DAC-driven temporal profiles and regulatory connectivity patterns are obtained by the application of computational tools, with support from curated literature. It is worth emphasizing the capacity of networks to reconcile multi-type evidences, thus generating testable hypotheses made available by systems scale predictive inference power. Despite our small experimental setting, we propose through such integrations valuable impacts of epigenetic treatment in terms of gene expression measurements, and then validate evidenced apoptotic effects. PMID:26143641

  18. Distributed Computer Networks in Support of Complex Group Practices

    PubMed Central

    Wess, Bernard P.

    1978-01-01

    The economics of medical computer networks are presented in context with the patient care and administrative goals of medical networks. Design alternatives and network topologies are discussed with an emphasis on medical network design requirements in distributed data base design, telecommunications, satellite systems, and software engineering. The success of the medical computer networking technology is predicated on the ability of medical and data processing professionals to design comprehensive, efficient, and virtually impenetrable security systems to protect data bases, network access and services, and patient confidentiality.

  19. Theory VI. Computational Materials Sciences Network (CMSN)

    SciTech Connect

    Zhang, Z Y

    2008-06-25

    The Computational Materials Sciences Network (CMSN) is a virtual center consisting of scientists interested in working together, across organizational and disciplinary boundaries, to formulate and pursue projects that reflect challenging and relevant computational research in the materials sciences. The projects appropriate for this center involve those problems best pursued through broad cooperative efforts, rather than those key problems best tackled by single investigator groups. CMSN operates similarly to the DOE Center of Excellence for the Synthesis and Processing of Advanced Materials, coordinated by George Samara at Sandia. As in the Synthesis and Processing Center, the intent of the modest funding for CMSN is to foster partnering and collective activities. All CMSN proposals undergo external peer review and are judged foremost on the quality and timeliness of the science and also on criteria relevant to the objective of the center, especially concerning a strategy for partnering. More details about CMSN can be found on the CMSN webpages at: http://cmpweb.ameslab.gov/ccms/CMSN-homepage.html.

  20. Interaction, Critical Thinking, and Social Network Analysis (SNA) in Online Courses

    ERIC Educational Resources Information Center

    Thormann, Joan; Gable, Samuel; Fidalgo, Patricia Seferlis; Blakeslee, George

    2013-01-01

    This study tried to ascertain a possible relationship between the number of student moderators (1, 2, and 3), online interactions, and critical thinking of K-12 educators enrolled in an online course that was taught from a constructivist approach. The course topic was use of technology in special education. Social network analysis (SNA) and…

  1. Towards a Versatile Tele-Education Platform for Computer Science Educators Based on the Greek School Network

    ERIC Educational Resources Information Center

    Paraskevas, Michael; Zarouchas, Thomas; Angelopoulos, Panagiotis; Perikos, Isidoros

    2013-01-01

    Now days the growing need for highly qualified computer science educators in modern educational environments is commonplace. This study examines the potential use of Greek School Network (GSN) to provide a robust and comprehensive e-training course for computer science educators in order to efficiently exploit advanced IT services and establish a…

  2. Network Computer Technology. Phase I: Viability and Promise within NASA's Desktop Computing Environment

    NASA Technical Reports Server (NTRS)

    Paluzzi, Peter; Miller, Rosalind; Kurihara, West; Eskey, Megan

    1998-01-01

    Over the past several months, major industry vendors have made a business case for the network computer as a win-win solution toward lowering total cost of ownership. This report provides results from Phase I of the Ames Research Center network computer evaluation project. It identifies factors to be considered for determining cost of ownership; further, it examines where, when, and how network computer technology might fit in NASA's desktop computing architecture.

  3. LEAP: A Computer Course for Gifted Students. Manila.

    ERIC Educational Resources Information Center

    Scruggs, Patricia; Johnson, Paul

    1985-01-01

    Learning Enrichment Activities Program (LEAP) is designed to offer intellectually challenging computer activities for gifted and talented children (grades 7-12) in Manila. Computer enrichment activities were designed according to an adaptation of the Enrichment Triad model. (CL)

  4. An Interdisciplinary Bibliography for Computers and the Humanities Courses.

    ERIC Educational Resources Information Center

    Ehrlich, Heyward

    1991-01-01

    Presents an annotated bibliography of works related to the subject of computers and the humanities. Groups items into textbooks and overviews; introductions; human and computer languages; literary and linguistic analysis; artificial intelligence and robotics; social issue debates; computers' image in fiction; anthologies; writing and the

  5. An Interdisciplinary Bibliography for Computers and the Humanities Courses.

    ERIC Educational Resources Information Center

    Ehrlich, Heyward

    1991-01-01

    Presents an annotated bibliography of works related to the subject of computers and the humanities. Groups items into textbooks and overviews; introductions; human and computer languages; literary and linguistic analysis; artificial intelligence and robotics; social issue debates; computers' image in fiction; anthologies; writing and the…

  6. DOE contractor radiation safety CBT (computer based training) course

    SciTech Connect

    Gardner, P.R.

    1986-01-01

    Westinghouse Hanford Company developed a generic Radiation Worker safety CBT course for Department of Energy contractors. Task analysis concentrated on actual and potential tasks and included visits to fourteen different contractor sites. Team Design and Prototype verification formed the major portion of the development phase. Lesson entry was accomplished using the WISE author system from WICAT Systems, Inc. The course features graded task simulations for both Pretest and Final; fourteen Topics in five Lessons, each Topic keyed to ''Critical Acts'' and Questions in the Pretest and Final; Automatic, Intensive, and Manual modes of instruction available for each Lesson; Practical Problems and Sample Questions associated with each Topic; and provisions for local configuration in several areas. The course is deliverable on IBM PC compatible equipment. 2 refs.

  7. Efficiently modeling neural networks on massively parallel computers

    NASA Technical Reports Server (NTRS)

    Farber, Robert M.

    1993-01-01

    Neural networks are a very useful tool for analyzing and modeling complex real world systems. Applying neural network simulations to real world problems generally involves large amounts of data and massive amounts of computation. To efficiently handle the computational requirements of large problems, we have implemented at Los Alamos a highly efficient neural network compiler for serial computers, vector computers, vector parallel computers, and fine grain SIMD computers such as the CM-2 connection machine. This paper describes the mapping used by the compiler to implement feed-forward backpropagation neural networks for a SIMD (Single Instruction Multiple Data) architecture parallel computer. Thinking Machines Corporation has benchmarked our code at 1.3 billion interconnects per second (approximately 3 gigaflops) on a 64,000 processor CM-2 connection machine (Singer 1990). This mapping is applicable to other SIMD computers and can be implemented on MIMD computers such as the CM-5 connection machine. Our mapping has virtually no communications overhead with the exception of the communications required for a global summation across the processors (which has a sub-linear runtime growth on the order of O(log(number of processors)). We can efficiently model very large neural networks which have many neurons and interconnects and our mapping can extend to arbitrarily large networks (within memory limitations) by merging the memory space of separate processors with fast adjacent processor interprocessor communications. This paper will consider the simulation of only feed forward neural network although this method is extendable to recurrent networks.

  8. A topology for computer networks with good survivability characteristics and low transmission delays between node computers

    NASA Technical Reports Server (NTRS)

    Kelly, G. L.; Jiang, D. P.

    1984-01-01

    Various network topologies are developed which have not appeared in the literature before which result in minimum diameter graphs for computer networks having connectivity four. The topologies presented have good survivability characteristics and result in more topologies being available for computer network designers which achieve the minimum diameter resulting in small transmission delays.

  9. Network Patch Cables Demystified: A Super Activity for Computer Networking Technology

    ERIC Educational Resources Information Center

    Brown, Douglas L.

    2004-01-01

    This article de-mystifies network patch cable secrets so that people can connect their computers and transfer those pesky files--without screaming at the cables. It describes a network cabling activity that can offer students a great hands-on opportunity for working with the tools, techniques, and media used in computer networking. Since the

  10. Network Patch Cables Demystified: A Super Activity for Computer Networking Technology

    ERIC Educational Resources Information Center

    Brown, Douglas L.

    2004-01-01

    This article de-mystifies network patch cable secrets so that people can connect their computers and transfer those pesky files--without screaming at the cables. It describes a network cabling activity that can offer students a great hands-on opportunity for working with the tools, techniques, and media used in computer networking. Since the…

  11. An Investigation of Student Practices in Asynchronous Computer Conferencing Courses

    ERIC Educational Resources Information Center

    Peters, Vanessa L.; Hewitt, Jim

    2010-01-01

    This study investigated the online practices of students enrolled in graduate-level distance education courses. Using interviews and a questionnaire as data sources, the study sought to: (a) identify common practices that students adopt in asynchronous discussions, and (b) gain an understanding of why students adopt them. An analysis of the data…

  12. Issues in Integrating Computers into an Operant Lab Course.

    ERIC Educational Resources Information Center

    Brazier, Mary M.

    A project at Loyola University introduced microcomputers into the animal operant laboratory taught in conjunction with a course on the psychology of learning. An IBM-compatible (Zenith) microcomputer, interfacing components, and the OPERANT/PC software program were selected to control the operant chambers and collect data. An instructor-generated…

  13. Administrators' Perceptions of Community College Students' Computer Literacy Skills in Beginner Courses

    ERIC Educational Resources Information Center

    Ragin, Tracey B.

    2013-01-01

    Fundamental computer skills are vital in the current technology-driven society. The purpose of this study was to investigate the development needs of students at a rural community college in the Southeast who lacked the computer literacy skills required in a basic computer course. Guided by Greenwood's pragmatic approach as a reformative force in

  14. On the Role of Computer Graphics in Engineering Design Graphics Courses.

    ERIC Educational Resources Information Center

    Pleck, Michael H.

    The implementation of two- and three-dimensional computer graphics in a freshmen engineering design course at the university level is described. An assessment of the capabilities and limitations of computer graphics is made, along with a presentation of the fundamental role which computer graphics plays in engineering design instruction.…

  15. Evaluating the Effectiveness of Collaborative Computer-Intensive Projects in an Undergraduate Psychometrics Course

    ERIC Educational Resources Information Center

    Barchard, Kimberly A.; Pace, Larry A.

    2010-01-01

    Undergraduate psychometrics classes often use computer-intensive active learning projects. However, little research has examined active learning or computer-intensive projects in psychometrics courses. We describe two computer-intensive collaborative learning projects used to teach the design and evaluation of psychological tests. Course…

  16. Computer Course Articulation among High Schools and Colleges and Universities in the State of Arizona.

    ERIC Educational Resources Information Center

    Babcock, Gifford M.

    The purpose of this study was to determine the extent of communication between Arizona's secondary schools and postsecondary institutions concerning computer education and computer literacy. A document analysis of college catalogs and a survey of 70 school districts determined the extent of advanced placement courses, computer education services,…

  17. Talking about Code: Integrating Pedagogical Code Reviews into Early Computing Courses

    ERIC Educational Resources Information Center

    Hundhausen, Christopher D.; Agrawal, Anukrati; Agarwal, Pawan

    2013-01-01

    Given the increasing importance of soft skills in the computing profession, there is good reason to provide students withmore opportunities to learn and practice those skills in undergraduate computing courses. Toward that end, we have developed an active learning approach for computing education called the "Pedagogical Code Review"…

  18. Talking about Code: Integrating Pedagogical Code Reviews into Early Computing Courses

    ERIC Educational Resources Information Center

    Hundhausen, Christopher D.; Agrawal, Anukrati; Agarwal, Pawan

    2013-01-01

    Given the increasing importance of soft skills in the computing profession, there is good reason to provide students withmore opportunities to learn and practice those skills in undergraduate computing courses. Toward that end, we have developed an active learning approach for computing education called the "Pedagogical Code Review"

  19. Events and Practices That Promote Attitudes and Emotions in Computing Courses.

    ERIC Educational Resources Information Center

    Hunt, Nancy P.; Bohlin, Roy M.

    1995-01-01

    This study examined specific classroom events and teaching practices that promoted positive attitudes and emotions by students in college computer courses. Analysis of student journals and interviews indicated specific classroom events and teaching practices lessened students' computer anxiety, promoted understanding of computers, and increased

  20. Administrators' Perceptions of Community College Students' Computer Literacy Skills in Beginner Courses

    ERIC Educational Resources Information Center

    Ragin, Tracey B.

    2013-01-01

    Fundamental computer skills are vital in the current technology-driven society. The purpose of this study was to investigate the development needs of students at a rural community college in the Southeast who lacked the computer literacy skills required in a basic computer course. Guided by Greenwood's pragmatic approach as a reformative force in…

  1. LAN Configuration and Analysis: Projects for the Data Communications and Networking Course

    ERIC Educational Resources Information Center

    Chen, Fang; Brabston, Mary

    2011-01-01

    We implemented two local area network (LAN) projects in our introductory data communications and networking course. The first project required students to develop a LAN from scratch for a small imaginary organization. The second project required student groups to analyze a LAN for a real world small organization. By allowing students to apply what…

  2. The Network Computer: Is It Right for Education?

    ERIC Educational Resources Information Center

    Galbreath, Jeremy

    1999-01-01

    Examines the network computer, originally conceived as an alternative device to personal computers to access the Internet and World Wide Web, from a technology perspective and looks at potential uses in education. Describes network architecture; discusses uses for library research, educational technology laboratories, and distance education.…

  3. Computer-Based Semantic Network in Molecular Biology: A Demonstration.

    ERIC Educational Resources Information Center

    Callman, Joshua L.; And Others

    This paper analyzes the hardware and software features that would be desirable in a computer-based semantic network system for representing biology knowledge. It then describes in detail a prototype network of molecular biology knowledge that has been developed using Filevision software and a Macintosh computer. The prototype contains about 100…

  4. Adaptive (Neural Network) Control In Computer-Integrated-Manufacturing

    NASA Astrophysics Data System (ADS)

    Chen, S.; Zhang, M.

    1988-03-01

    In a highly distributed CIM (Computer-Integrate-Manufacturing) environment, adaptive control using neural network processors is proposed. First, neural network concepts are employed to represent and to model knowledge in robotics and automation application domains. Then, the model captured by a neural network emulator serves as the distributed and adaptive controller of a CIM environment.

  5. SNAP: A computer program for generating symbolic network functions

    NASA Technical Reports Server (NTRS)

    Lin, P. M.; Alderson, G. E.

    1970-01-01

    The computer program SNAP (symbolic network analysis program) generates symbolic network functions for networks containing R, L, and C type elements and all four types of controlled sources. The program is efficient with respect to program storage and execution time. A discussion of the basic algorithms is presented, together with user's and programmer's guides.

  6. Portraits of PBL: Course Objectives and Students' Study Strategies in Computer Engineering, Psychology and Physiotherapy.

    ERIC Educational Resources Information Center

    Dahlgren, Madeleine Abrandt

    2000-01-01

    Compares the role of course objectives in relation to students' study strategies in problem-based learning (PBL). Results comprise data from three PBL programs at Linkopings University (Sweden), in physiotherapy, psychology, and computer engineering. Faculty provided course objectives to function as supportive structures and guides for students'…

  7. Affective Learning in Online Multimedia and Lecture Versions of an Introductory Computing Course

    ERIC Educational Resources Information Center

    Moneta, Giovanni B.; Kekkonen-Moneta, Synnove S.

    2007-01-01

    This study evaluated students' affective learning in an introductory computing course that was taught in Hong Kong once in a lecture format and twice in a rich interactive multimedia online format to 414 college students in all. A simplified experience sampling method was used to assess affective learning at the midterm and end of each course in…

  8. Fostering Critical Reflection in a Computer-Based, Asynchronously Delivered Diversity Training Course

    ERIC Educational Resources Information Center

    Givhan, Shawn T.

    2013-01-01

    This dissertation study chronicles the creation of a computer-based, asynchronously delivered diversity training course for a state agency. The course format enabled efficient delivery of a mandatory curriculum to the Massachusetts Department of State Police workforce. However, the asynchronous format posed a challenge to achieving the learning…

  9. Toward a Singleton Undergraduate Computer Graphics Course in Small and Medium-Sized Colleges

    ERIC Educational Resources Information Center

    Shesh, Amit

    2013-01-01

    This article discusses the evolution of a single undergraduate computer graphics course over five semesters, driven by a primary question: if one could offer only one undergraduate course in graphics, what would it include? This constraint is relevant to many small and medium-sized colleges that lack resources, adequate expertise, and enrollment

  10. Evaluation of the Effectiveness of a Web-Based Learning Design for Adult Computer Science Courses

    ERIC Educational Resources Information Center

    Antonis, Konstantinos; Daradoumis, Thanasis; Papadakis, Spyros; Simos, Christos

    2011-01-01

    This paper reports on work undertaken within a pilot study concerned with the design, development, and evaluation of online computer science training courses. Drawing on recent developments in e-learning technology, these courses were structured around the principles of a learner-oriented approach for use with adult learners. The paper describes a…

  11. Educational Impact of Digital Visualization Tools on Digital Character Production Computer Science Courses

    ERIC Educational Resources Information Center

    van Langeveld, Mark Christensen

    2009-01-01

    Digital character production courses have traditionally been taught in art departments. The digital character production course at the University of Utah is centered, drawing uniformly from art and engineering disciplines. Its design has evolved to include a synergy of computer science, functional art and human anatomy. It gives students an

  12. Educational Impact of Digital Visualization Tools on Digital Character Production Computer Science Courses

    ERIC Educational Resources Information Center

    van Langeveld, Mark Christensen

    2009-01-01

    Digital character production courses have traditionally been taught in art departments. The digital character production course at the University of Utah is centered, drawing uniformly from art and engineering disciplines. Its design has evolved to include a synergy of computer science, functional art and human anatomy. It gives students an…

  13. Learning Computing Topics in Undergraduate Information Systems Courses: Managing Perceived Difficulty

    ERIC Educational Resources Information Center

    Wall, Jeffrey D.; Knapp, Janice

    2014-01-01

    Learning technical computing skills is increasingly important in our technology driven society. However, learning technical skills in information systems (IS) courses can be difficult. More than 20 percent of students in some technical courses may dropout or fail. Unfortunately, little is known about students' perceptions of the difficulty of…

  14. Toward a Singleton Undergraduate Computer Graphics Course in Small and Medium-Sized Colleges

    ERIC Educational Resources Information Center

    Shesh, Amit

    2013-01-01

    This article discusses the evolution of a single undergraduate computer graphics course over five semesters, driven by a primary question: if one could offer only one undergraduate course in graphics, what would it include? This constraint is relevant to many small and medium-sized colleges that lack resources, adequate expertise, and enrollment…

  15. Evaluation of the Effectiveness of a Web-Based Learning Design for Adult Computer Science Courses

    ERIC Educational Resources Information Center

    Antonis, Konstantinos; Daradoumis, Thanasis; Papadakis, Spyros; Simos, Christos

    2011-01-01

    This paper reports on work undertaken within a pilot study concerned with the design, development, and evaluation of online computer science training courses. Drawing on recent developments in e-learning technology, these courses were structured around the principles of a learner-oriented approach for use with adult learners. The paper describes a

  16. Discussing Course Literature Online: Analysis of Macro Speech Acts in an Asynchronous Computer Conference

    ERIC Educational Resources Information Center

    Kosunen, Riitta

    2009-01-01

    This paper presents a macro speech act analysis of computer-mediated conferencing on a university course on language pedagogy. Students read scholarly articles on language learning and discussed them online, in order to make sense of them collaboratively in preparation for a reflective essay. The study explores how the course participants made use

  17. A Computational-Modeling Course for Undergraduate Students in Chemical Technology

    ERIC Educational Resources Information Center

    Hessley, Rita K.

    2004-01-01

    The PC-based software technology, a computational-modeling course, for undergraduate chemistry students helps them to understand the molecular modeling in a better way. This course would be able to accommodate a wider array of topics and a greater depth of theory as the modeling is increasingly incorporated into the chemistry curriculum.

  18. Social Studies: Application Units. Course II, Teachers. Computer-Oriented Curriculum. REACT (Relevant Educational Applications of Computer Technology).

    ERIC Educational Resources Information Center

    Tecnica Education Corp., San Carlos, CA.

    This book is one of a series in Course II of the Relevant Educational Applications of Computer Technology (REACT) Project. It is designed to point out to teachers two of the major applications of computers in the social sciences: simulation and data analysis. The first section contains a variety of simulation units organized under the following…

  19. Integrating Computer-Mediated Communication into an EAP Course

    ERIC Educational Resources Information Center

    Li, Xiao; Cao, Ru-hua

    2006-01-01

    The development of the computer along with the widespread use of the Internet has rapidly promoted Computer-Mediated Communication (CMC) as a very important communication media, which can be used widely and effectively in foreign language teaching and learning. This essay tries to explore the advantages of CMC as well as its proposed application,…

  20. Learning Motivation in E-Learning Facilitated Computer Programming Courses

    ERIC Educational Resources Information Center

    Law, Kris M. Y.; Lee, Victor C. S.; Yu, Y. T.

    2010-01-01

    Computer programming skills constitute one of the core competencies that graduates from many disciplines, such as engineering and computer science, are expected to possess. Developing good programming skills typically requires students to do a lot of practice, which cannot sustain unless they are adequately motivated. This paper reports a…

  1. Introductory Computer-Based Mechanics; A One Week Sample Course.

    ERIC Educational Resources Information Center

    Bork, Alfred M.; And Others

    Very little material exists for utilizing the computer in the physics classroom, and even that little is not widely known. It is hoped that this monograph will provide some stimulus both to innovation and to discussion of the role of the computer in physics education. The paper describes how this might be achieved with a detailed account of one

  2. Predictors of Enrollment in High School Computer Courses.

    ERIC Educational Resources Information Center

    Campbell, N. Jo; Perry, Katye M.

    Factors affecting the motivation of high school students to learn to use computers were examined in this study. The subjects were 160 students enrolled in a large city high school, 89 females and 71 males who represented five ethnic groups--White, Black, Hispanic, Asian, and American Indian. The majority of subjects had prior computer coursework…

  3. A computer aided teaching course on corrosion of concrete structures

    SciTech Connect

    Ramesht, M.H.; Cottis, R.A.

    1996-10-01

    Computers provide a powerful opportunity for the development of teaching materials. They provide a rich interactive environment to stimulate and engage the student. The advent of computers with multimedia capabilities allows the constructor of teaching materials to show the student material from many sources; text, chart, audio, video, animation, simulation, sound or photographs. When these are combined with interactivity, a powerful learning environment is created. There is currently no CAL (Computer Aided Learning) or CBT (Computer Based Training) material available on the subject of corrosion and corrosion protection in concrete structures for civil engineering students. This paper will describe a Computer Aided Learning package intended to introduce students to the environmental degradation of concrete structures.

  4. Computer analysis of general linear networks using digraphs.

    NASA Technical Reports Server (NTRS)

    Mcclenahan, J. O.; Chan, S.-P.

    1972-01-01

    Investigation of the application of digraphs in analyzing general electronic networks, and development of a computer program based on a particular digraph method developed by Chen. The Chen digraph method is a topological method for solution of networks and serves as a shortcut when hand calculations are required. The advantage offered by this method of analysis is that the results are in symbolic form. It is limited, however, by the size of network that may be handled. Usually hand calculations become too tedious for networks larger than about five nodes, depending on how many elements the network contains. Direct determinant expansion for a five-node network is a very tedious process also.

  5. Network selection, Information filtering and Scalable computation

    NASA Astrophysics Data System (ADS)

    Ye, Changqing

    This dissertation explores two application scenarios of sparsity pursuit method on large scale data sets. The first scenario is classification and regression in analyzing high dimensional structured data, where predictors corresponds to nodes of a given directed graph. This arises in, for instance, identification of disease genes for the Parkinson's diseases from a network of candidate genes. In such a situation, directed graph describes dependencies among the genes, where direction of edges represent certain causal effects. Key to high-dimensional structured classification and regression is how to utilize dependencies among predictors as specified by directions of the graph. In this dissertation, we develop a novel method that fully takes into account such dependencies formulated through certain nonlinear constraints. We apply the proposed method to two applications, feature selection in large margin binary classification and in linear regression. We implement the proposed method through difference convex programming for the cost function and constraints. Finally, theoretical and numerical analyses suggest that the proposed method achieves the desired objectives. An application to disease gene identification is presented. The second application scenario is personalized information filtering which extracts the information specifically relevant to a user, predicting his/her preference over a large number of items, based on the opinions of users who think alike or its content. This problem is cast into the framework of regression and classification, where we introduce novel partial latent models to integrate additional user-specific and content-specific predictors, for higher predictive accuracy. In particular, we factorize a user-over-item preference matrix into a product of two matrices, each representing a user's preference and an item preference by users. Then we propose a likelihood method to seek a sparsest latent factorization, from a class of over-complete factorizations, possibly with a high percentage of missing values. This promotes additional sparsity beyond rank reduction. Computationally, we design methods based on a ``decomposition and combination'' strategy, to break large-scale optimization into many small subproblems to solve in a recursive and parallel manner. On this basis, we implement the proposed methods through multi-platform shared-memory parallel programming, and through Mahout, a library for scalable machine learning and data mining, for mapReduce computation. For example, our methods are scalable to a dataset consisting of three billions of observations on a single machine with sufficient memory, having good timings. Both theoretical and numerical investigations show that the proposed methods exhibit significant improvement in accuracy over state-of-the-art scalable methods.

  6. A Novel College Network Resource Management Method using Cloud Computing

    NASA Astrophysics Data System (ADS)

    Lin, Chen

    At present information construction of college mainly has construction of college networks and management information system; there are many problems during the process of information. Cloud computing is development of distributed processing, parallel processing and grid computing, which make data stored on the cloud, make software and services placed in the cloud and build on top of various standards and protocols, you can get it through all kinds of equipments. This article introduces cloud computing and function of cloud computing, then analyzes the exiting problems of college network resource management, the cloud computing technology and methods are applied in the construction of college information sharing platform.

  7. Evaluation of the Manitoba High School Computer Network.

    ERIC Educational Resources Information Center

    Haughey, D. G.; And Others

    Designed to provide information for decision making when the current 5-year contract with the supplier of computing services to the Manitoba High School Computer Network expires in 1982, this study included both an assessment of the existing situation and the identification of alternative options for the provision of computer services to the…

  8. Using high-performance networks to enable computational aerosciences applications

    NASA Technical Reports Server (NTRS)

    Johnson, Marjory J.

    1992-01-01

    One component of the U.S. Federal High Performance Computing and Communications Program (HPCCP) is the establishment of a gigabit network to provide a communications infrastructure for researchers across the nation. This gigabit network will provide new services and capabilities, in addition to increased bandwidth, to enable future applications. An understanding of these applications is necessary to guide the development of the gigabit network and other high-performance networks of the future. In this paper we focus on computational aerosciences applications run remotely using the Numerical Aerodynamic Simulation (NAS) facility located at NASA Ames Research Center. We characterize these applications in terms of network-related parameters and relate user experiences that reveal limitations imposed by the current wide-area networking infrastructure. Then we investigate how the development of a nationwide gigabit network would enable users of the NAS facility to work in new, more productive ways.

  9. Normalizing Social Networking in a Beginners' Japanese Course

    ERIC Educational Resources Information Center

    Morofushi, Mari; Pasfield-Neofitou, Sarah Ellen

    2014-01-01

    With the spread of the Internet, students now have greater opportunities to use Japanese outside of the classroom. For example, they can interact with other Japanese speakers through instant messaging or social networking, or utilize online dictionaries and translation tools to decipher websites in ways that would be impossible with traditional

  10. Normalizing Social Networking in a Beginners' Japanese Course

    ERIC Educational Resources Information Center

    Morofushi, Mari; Pasfield-Neofitou, Sarah Ellen

    2014-01-01

    With the spread of the Internet, students now have greater opportunities to use Japanese outside of the classroom. For example, they can interact with other Japanese speakers through instant messaging or social networking, or utilize online dictionaries and translation tools to decipher websites in ways that would be impossible with traditional…

  11. HeNCE: A Heterogeneous Network Computing Environment

    DOE PAGESBeta

    Beguelin, Adam; Dongarra, Jack J.; Geist, George Al; Manchek, Robert; Moore, Keith

    1994-01-01

    Network computing seeks to utilize the aggregate resources of many networked computers to solve a single problem. In so doing it is often possible to obtain supercomputer performance from an inexpensive local area network. The drawback is that network computing is complicated and error prone when done by hand, especially if the computers have different operating systems and data formats and are thus heterogeneous. The heterogeneous network computing environment (HeNCE) is an integrated graphical environment for creating and running parallel programs over a heterogeneous collection of computers. It is built on a lower level package called parallel virtual machine (PVM).more » The HeNCE philosophy of parallel programming is to have the programmer graphically specify the parallelism of a computation and to automate, as much as possible, the tasks of writing, compiling, executing, debugging, and tracing the network computation. Key to HeNCE is a graphical language based on directed graphs that describe the parallelism and data dependencies of an application. Nodes in the graphs represent conventional Fortran or C subroutines and the arcs represent data and control flow. This article describes the present state of HeNCE, its capabilities, limitations, and areas of future research.« less

  12. Computation by Switching in Complex Networks of States

    NASA Astrophysics Data System (ADS)

    Schittler Neves, Fabio; Timme, Marc

    2012-07-01

    Complex networks of dynamically connected saddle states persistently emerge in a broad range of high-dimensional systems and may reliably encode inputs as specific switching trajectories. Their computational capabilities, however, are far from being understood. Here, we analyze how symmetry-breaking inhomogeneities naturally induce predictable persistent switching dynamics across such networks. We show that such systems are capable of computing arbitrary logic operations by entering into switching sequences in a controlled way. This dynamics thus offers a highly flexible new kind of computation based on switching along complex networks of states.

  13. A Successful Course of Study in Computer Programming

    ERIC Educational Resources Information Center

    Seeger, David H.

    1977-01-01

    Three keys to the successful development of the program of the computer programming department of the Technical Institute of Oklahoma State University are discussed: Community involvement, faculty/administration commitment to the basic principles of technical career education, and availability of appropriate equipment for student use. (HD)

  14. Computer Literacy Course for Teacher for the 21st Century

    ERIC Educational Resources Information Center

    Tatkovic, Nevenka; Ruzic, Maja

    2004-01-01

    The life and activities of every man in the transitional period from the second to the third millennium has been characterized by huge changes that resulted from scientific and technological revolution in which dominates a highly developed IT-Communicational Technology. This paper concludes that to attain IT-literacy and computer literacy would…

  15. Matrix Transformations in Lower Level Computer Graphics Course.

    ERIC Educational Resources Information Center

    Ying, Dao-ning

    1982-01-01

    Presents computer programs (Applesoft Basic) for: (1) 2-D rotation about any point through any angle; (2) matrix transformation for 2-D rotation; (3) 3-D translation; (4) 3-D rotation; and (5) hyperboloid rotated in 2-D space. Includes background information and sample output for the matrix transformation subroutines. (JN)

  16. Wireless Networks: New Meaning to Ubiquitous Computing.

    ERIC Educational Resources Information Center

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  17. Phoebus: Network Middleware for Next-Generation Network Computing

    SciTech Connect

    Martin Swany

    2012-06-16

    The Phoebus project investigated algorithms, protocols, and middleware infrastructure to improve end-to-end performance in high speed, dynamic networks. The Phoebus system essentially serves as an adaptation point for networks with disparate capabilities or provisioning. This adaptation can take a variety of forms including acting as a provisioning agent across multiple signaling domains, providing transport protocol adaptation points, and mapping between distributed resource reservation paradigms and the optical network control plane. We have successfully developed the system and demonstrated benefits. The Phoebus system was deployed in Internet2 and in ESnet, as well as in GEANT2, RNP in Brazil and over international links to Korea and Japan. Phoebus is a system that implements a new protocol and associated forwarding infrastructure for improving throughput in high-speed dynamic networks. It was developed to serve the needs of large DOE applications on high-performance networks. The idea underlying the Phoebus model is to embed Phoebus Gateways (PGs) in the network as on-ramps to dynamic circuit networks. The gateways act as protocol translators that allow legacy applications to use dedicated paths with high performance.

  18. Syntactic Computations in the Language Network: Characterizing Dynamic Network Properties Using Representational Similarity Analysis

    PubMed Central

    Tyler, Lorraine K.; Cheung, Teresa P. L.; Devereux, Barry J.; Clarke, Alex

    2013-01-01

    The core human capacity of syntactic analysis involves a left hemisphere network involving left inferior frontal gyrus (LIFG) and posterior middle temporal gyrus (LMTG) and the anatomical connections between them. Here we use magnetoencephalography (MEG) to determine the spatio-temporal properties of syntactic computations in this network. Listeners heard spoken sentences containing a local syntactic ambiguity (e.g., “… landing planes …”), at the offset of which they heard a disambiguating verb and decided whether it was an acceptable/unacceptable continuation of the sentence. We charted the time-course of processing and resolving syntactic ambiguity by measuring MEG responses from the onset of each word in the ambiguous phrase and the disambiguating word. We used representational similarity analysis (RSA) to characterize syntactic information represented in the LIFG and left posterior middle temporal gyrus (LpMTG) over time and to investigate their relationship to each other. Testing a variety of lexico-syntactic and ambiguity models against the MEG data, our results suggest early lexico-syntactic responses in the LpMTG and later effects of ambiguity in the LIFG, pointing to a clear differentiation in the functional roles of these two regions. Our results suggest the LpMTG represents and transmits lexical information to the LIFG, which responds to and resolves the ambiguity. PMID:23730293

  19. Relationships among Learning Styles and Motivation with Computer-Aided Instruction in an Agronomy Course

    ERIC Educational Resources Information Center

    McAndrews, Gina M.; Mullen, Russell E.; Chadwick, Scott A.

    2005-01-01

    Multi-media learning tools were developed to enhance student learning for an introductory agronomy course at Iowa State University. During fall 2002, the new interactive computer program, called Computer Interactive Multimedia Program for Learning Enhancement (CIMPLE) was incorporated into the teaching, learning, and assessment processes of the…

  20. Evaluation of Web-Based Computer-Aided Instruction in a Basic Science Course.

    ERIC Educational Resources Information Center

    McNulty, John A.; Halama, James; Dauzvardis, Michael F.; Espiritu, Baltazar

    2000-01-01

    Assessed use of server statistics to evaluate utilization of web-based computer assisted instruction (CAI) in the undergraduate medical curriculum. No correlation was found between students' computer literacy at matriculation and subsequent levels of CAI use. Utilization of CAI developed for specific course objectives coincided closely with course…

  1. Design and Delivery of Multiple Server-Side Computer Languages Course

    ERIC Educational Resources Information Center

    Wang, Shouhong; Wang, Hai

    2011-01-01

    Given the emergence of service-oriented architecture, IS students need to be knowledgeable of multiple server-side computer programming languages to be able to meet the needs of the job market. This paper outlines the pedagogy of an innovative course of multiple server-side computer languages for the undergraduate IS majors. The paper discusses…

  2. Computer, Video, and Rapid-Cycling Plant Projects in an Undergraduate Plant Breeding Course.

    ERIC Educational Resources Information Center

    Michaels, T. E.

    1993-01-01

    Studies the perceived effectiveness of four student projects involving videotape production, computer conferencing, microcomputer simulation, and rapid-cycling Brassica breeding for undergraduate plant breeding students in two course offerings in consecutive years. Linking of the computer conferencing and video projects improved the rating of the

  3. Computer, Video, and Rapid-Cycling Plant Projects in an Undergraduate Plant Breeding Course.

    ERIC Educational Resources Information Center

    Michaels, T. E.

    1993-01-01

    Studies the perceived effectiveness of four student projects involving videotape production, computer conferencing, microcomputer simulation, and rapid-cycling Brassica breeding for undergraduate plant breeding students in two course offerings in consecutive years. Linking of the computer conferencing and video projects improved the rating of the…

  4. Towards Student Instrumentation of Computer-Based Algebra Systems in University Courses

    ERIC Educational Resources Information Center

    Stewart, Sepideh; Thomas, Michael O. J.; Hannah, John

    2005-01-01

    There are many perceived benefits of using technology, such as computer algebra systems, in undergraduate mathematics courses. However, attaining these benefits sometimes proves elusive. Some of the key variables are the teaching approach and the student instrumentation of the technology. This paper considers the instrumentation of computer-based…

  5. Happenstance and Compromise: A Gendered Analysis of Students' Computing Degree Course Selection

    ERIC Educational Resources Information Center

    Lang, Catherine

    2010-01-01

    The number of students choosing to study computing at university continues to decline this century, with an even sharper decline in female students. This article presents the results of a series of interviews with university students studying computing courses in Australia that uncovered the influence of happenstance and compromise on course…

  6. Formative Questioning in Computer Learning Environments: A Course for Pre-Service Mathematics Teachers

    ERIC Educational Resources Information Center

    Akko, Hatice

    2015-01-01

    This paper focuses on a specific aspect of formative assessment, namely questioning. Given that computers have gained widespread use in learning and teaching, specific attention should be made when organizing formative assessment in computer learning environments (CLEs). A course including various workshops was designed to develop knowledge and

  7. The Use of a Computer Algebra System in Capstone Mathematics Courses for Undergraduate Mathematics Majors.

    ERIC Educational Resources Information Center

    Harris, Gary A.

    2000-01-01

    Discusses the use of a computer algebra system in a capstone mathematics course for undergraduate mathematics majors preparing to teach secondary school mathematics. Provides sample exercises intended to demonstrate how the power of a computer algebra system such as MAPLE can contribute to desired outcomes including reinforcing and strengthening…

  8. Design and Delivery of Multiple Server-Side Computer Languages Course

    ERIC Educational Resources Information Center

    Wang, Shouhong; Wang, Hai

    2011-01-01

    Given the emergence of service-oriented architecture, IS students need to be knowledgeable of multiple server-side computer programming languages to be able to meet the needs of the job market. This paper outlines the pedagogy of an innovative course of multiple server-side computer languages for the undergraduate IS majors. The paper discusses

  9. Formative Questioning in Computer Learning Environments: A Course for Pre-Service Mathematics Teachers

    ERIC Educational Resources Information Center

    Akkoç, Hatice

    2015-01-01

    This paper focuses on a specific aspect of formative assessment, namely questioning. Given that computers have gained widespread use in learning and teaching, specific attention should be made when organizing formative assessment in computer learning environments (CLEs). A course including various workshops was designed to develop knowledge and…

  10. Causal Attributions of Success and Failure Made by Undergraduate Students in an Introductory-Level Computer Programming Course

    ERIC Educational Resources Information Center

    Hawi, N.

    2010-01-01

    The purpose of this research is to identify the causal attributions of business computing students in an introductory computer programming course, in the computer science department at Notre Dame University, Louaize. Forty-five male and female undergraduates who completed the computer programming course that extended for a 13-week semester

  11. Causal Attributions of Success and Failure Made by Undergraduate Students in an Introductory-Level Computer Programming Course

    ERIC Educational Resources Information Center

    Hawi, N.

    2010-01-01

    The purpose of this research is to identify the causal attributions of business computing students in an introductory computer programming course, in the computer science department at Notre Dame University, Louaize. Forty-five male and female undergraduates who completed the computer programming course that extended for a 13-week semester…

  12. Computing the Local Field Potential (LFP) from Integrate-and-Fire Network Models.

    PubMed

    Mazzoni, Alberto; Lindén, Henrik; Cuntz, Hermann; Lansner, Anders; Panzeri, Stefano; Einevoll, Gaute T

    2015-12-01

    Leaky integrate-and-fire (LIF) network models are commonly used to study how the spiking dynamics of neural networks changes with stimuli, tasks or dynamic network states. However, neurophysiological studies in vivo often rather measure the mass activity of neuronal microcircuits with the local field potential (LFP). Given that LFPs are generated by spatially separated currents across the neuronal membrane, they cannot be computed directly from quantities defined in models of point-like LIF neurons. Here, we explore the best approximation for predicting the LFP based on standard output from point-neuron LIF networks. To search for this best "LFP proxy", we compared LFP predictions from candidate proxies based on LIF network output (e.g, firing rates, membrane potentials, synaptic currents) with "ground-truth" LFP obtained when the LIF network synaptic input currents were injected into an analogous three-dimensional (3D) network model of multi-compartmental neurons with realistic morphology, spatial distributions of somata and synapses. We found that a specific fixed linear combination of the LIF synaptic currents provided an accurate LFP proxy, accounting for most of the variance of the LFP time course observed in the 3D network for all recording locations. This proxy performed well over a broad set of conditions, including substantial variations of the neuronal morphologies. Our results provide a simple formula for estimating the time course of the LFP from LIF network simulations in cases where a single pyramidal population dominates the LFP generation, and thereby facilitate quantitative comparison between computational models and experimental LFP recordings in vivo. PMID:26657024

  13. Computing the Local Field Potential (LFP) from Integrate-and-Fire Network Models

    PubMed Central

    Cuntz, Hermann; Lansner, Anders; Panzeri, Stefano; Einevoll, Gaute T.

    2015-01-01

    Leaky integrate-and-fire (LIF) network models are commonly used to study how the spiking dynamics of neural networks changes with stimuli, tasks or dynamic network states. However, neurophysiological studies in vivo often rather measure the mass activity of neuronal microcircuits with the local field potential (LFP). Given that LFPs are generated by spatially separated currents across the neuronal membrane, they cannot be computed directly from quantities defined in models of point-like LIF neurons. Here, we explore the best approximation for predicting the LFP based on standard output from point-neuron LIF networks. To search for this best “LFP proxy”, we compared LFP predictions from candidate proxies based on LIF network output (e.g, firing rates, membrane potentials, synaptic currents) with “ground-truth” LFP obtained when the LIF network synaptic input currents were injected into an analogous three-dimensional (3D) network model of multi-compartmental neurons with realistic morphology, spatial distributions of somata and synapses. We found that a specific fixed linear combination of the LIF synaptic currents provided an accurate LFP proxy, accounting for most of the variance of the LFP time course observed in the 3D network for all recording locations. This proxy performed well over a broad set of conditions, including substantial variations of the neuronal morphologies. Our results provide a simple formula for estimating the time course of the LFP from LIF network simulations in cases where a single pyramidal population dominates the LFP generation, and thereby facilitate quantitative comparison between computational models and experimental LFP recordings in vivo. PMID:26657024

  14. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  15. Traditional computing center as a modern network node

    SciTech Connect

    Heller, S.; Peskin, A.M.

    1981-11-01

    There is an obvious trend toward decentralization of computing power from the traditional, large computing center. Even so there remains a generous, but changing role for such centers to play. Their capabilities would then be complimentary to smaller, individualized facilities, so the user would benefit greatly from a general purpose, local network on which the large center represented a node. There is no network currently available that exhibits all the attributes of the ideal local for this environment. It can be approached, however, by combining several diverse products as network segments, which are interconnected via processor gateways. This is in fact the strategy being followed at Brookhaven National Laboratory, which has a computing environment typical of a large class of institutions. The attributes of the ideal network are presented. A brief discussion of the current state-of-the-art in networking is then given. Finally, the particulars of the Brookhaven implementation are offered as a case history.

  16. CFD Optimization on Network-Based Parallel Computer System

    NASA Technical Reports Server (NTRS)

    Cheung, Samson H.; Holst, Terry L. (Technical Monitor)

    1994-01-01

    Combining multiple engineering workstations into a network-based heterogeneous parallel computer allows application of aerodynamic optimization with advance computational fluid dynamics codes, which is computationally expensive in mainframe supercomputer. This paper introduces a nonlinear quasi-Newton optimizer designed for this network-based heterogeneous parallel computer on a software called Parallel Virtual Machine. This paper will introduce the methodology behind coupling a Parabolized Navier-Stokes flow solver to the nonlinear optimizer. This parallel optimization package has been applied to reduce the wave drag of a body of revolution and a wing/body configuration with results of 5% to 6% drag reduction.

  17. Parallel CFD design on network-based computer

    NASA Technical Reports Server (NTRS)

    Cheung, Samson

    1995-01-01

    Combining multiple engineering workstations into a network-based heterogeneous parallel computer allows application of aerodynamic optimization with advanced computational fluid dynamics codes, which can be computationally expensive on mainframe supercomputers. This paper introduces a nonlinear quasi-Newton optimizer designed for this network-based heterogeneous parallel computing environment utilizing a software called Parallel Virtual Machine. This paper will introduce the methodology behind coupling a Parabolized Navier-Stokes flow solver to the nonlinear optimizer. This parallel optimization package is applied to reduce the wave drag of a body of revolution and a wing/body configuration with results of 5% to 6% drag reduction.

  18. Computers, Electronic Networking and Education: Some American Experiences.

    ERIC Educational Resources Information Center

    McConnell, David

    1991-01-01

    Describes new developments in distributed educational computing at Massachusetts Institute of Technology (MIT, "Athena"), Carnegie Mellon University ("Andrew"), Brown University "Intermedia"), Electronic University Network (California), Western Behavioral Sciences Institute (California), and University of California, Irvine. Topics discussed…

  19. Spreadsheet Analysis Of Queuing In A Computer Network

    NASA Technical Reports Server (NTRS)

    Galant, David C.

    1992-01-01

    Method of analyzing responses of computer network based on simple queuing-theory mathmatical models via spreadsheet program. Effects of variations in traffic, capacities of channels, and message protocols assessed.

  20. Communications Training Courses Across the Leopold Leadership Network

    NASA Astrophysics Data System (ADS)

    Hayden, T.; Gerber, L. R.; Silver, W. L.

    2012-12-01

    For nearly fifteen years, the Leopold Leadership Program has provided science communication training and support to mid-career academic environmental researchers from across North America. There has been an emphasis throughout on effective communication to non-scientific audiences. Increasingly, Leopold fellows have been developing communications courses for their own students, responding to the need for future scientists to be able to communicate well with the public, the media, policy makers and other audiences. At a June 2012 reunion meeting, a group of past fellows and communications trainers conducted a curriculum exchange, sharing experiences and ideas for successful inclusion of communications training in environmental science curricula. This presentation will present case studies from several institutions, including the use of podcasting, web columns, social media, in-person presentation and other presentation styles for connecting general audiences. We will share best practices, challenges and recommendations for curriculum development and institutional acceptance.

  1. Optical processing for future computer networks

    NASA Technical Reports Server (NTRS)

    Husain, A.; Haugen, P. R.; Hutcheson, L. D.; Warrior, J.; Murray, N.; Beatty, M.

    1986-01-01

    In the development of future data management systems, such as the NASA Space Station, a major problem represents the design and implementation of a high performance communication network which is self-correcting and repairing, flexible, and evolvable. To obtain the goal of designing such a network, it will be essential to incorporate distributed adaptive network control techniques. The present paper provides an outline of the functional and communication network requirements for the Space Station data management system. Attention is given to the mathematical representation of the operations being carried out to provide the required functionality at each layer of communication protocol on the model. The possible implementation of specific communication functions in optics is also considered.

  2. Improving Computing Courses from the Points of View of Students and Teachers: A Review and an Empirical Study

    ERIC Educational Resources Information Center

    Sampaio, Alberto; Sampaio, Isabel

    2012-01-01

    The improvement of computing courses is a permanent need and is a goal established by any teacher. Suggestions of possible course improvements should be made by teachers and students. Computer project-based courses involving a significant number of people pose difficulties to listening to all their opinions. The purpose of our research is twofold:…

  3. Electrooptical adaptive switching network for the hypercube computer

    NASA Technical Reports Server (NTRS)

    Chow, E.; Peterson, J.

    1988-01-01

    An all-optical network design for the hyperswitch network using regular free-space interconnects between electronic processor nodes is presented. The adaptive routing model used is described, and an adaptive routing control example is presented. The design demonstrates that existing electrooptical techniques are sufficient for implementing efficient parallel architectures without the need for more complex means of implementing arbitrary interconnection schemes. The electrooptical hyperswitch network significantly improves the communication performance of the hypercube computer.

  4. Computer Networking Strategies for Building Collaboration among Science Educators.

    ERIC Educational Resources Information Center

    Aust, Ronald

    The development and dissemination of science materials can be associated with technical delivery systems such as the Unified Network for Informatics in Teacher Education (UNITE). The UNITE project was designed to investigate ways for using computer networking to improve communications and collaboration among university schools of education and…

  5. Economics of Computing: The Case of Centralized Network File Servers.

    ERIC Educational Resources Information Center

    Solomon, Martin B.

    1994-01-01

    Discusses computer networking and the cost effectiveness of decentralization, including local area networks. A planned experiment with a centralized approach to the operation and management of file servers at the University of South Carolina is described that hopes to realize cost savings and the avoidance of staffing problems. (Contains four

  6. Computer Network Security: Best Practices for Alberta School Jurisdictions.

    ERIC Educational Resources Information Center

    Alberta Dept. of Education, Edmonton.

    This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…

  7. The Role of Computer Networks in Aerospace Engineering.

    ERIC Educational Resources Information Center

    Bishop, Ann Peterson

    1994-01-01

    Presents selected results from an empirical investigation into the use of computer networks in aerospace engineering based on data from a national mail survey. The need for user-based studies of electronic networking is discussed, and a copy of the questionnaire used in the survey is appended. (Contains 46 references.) (LRW)

  8. Librarians and Community Computer Networks: A Training Institute.

    ERIC Educational Resources Information Center

    Yerkey, A. Neil

    1997-01-01

    Describes an institute designed to train librarians to use the Buffalo Free-Net, an open-access community computer system. The objectives were to help librarians become comfortable with networked information and to teach them how to exploit the potential of the network to serve the information needs of their communities. (Author/LRW)

  9. A Short Course in Computational Science and Engineering

    NASA Astrophysics Data System (ADS)

    Yevick, David

    2012-05-01

    1. Introduction; 2. Octave programming; 3. Installing and running the Dev-C++ programming environment; 4. Introduction to computer and software architecture; 5. Fundamental concepts; 6. Procedural programming basics; 7. An introduction to object-oriented analysis; 8. C++ object-oriented programming syntax; 9. Arrays and matrices; 10. Input and output stream; 11. References; 12. Pointers and dynamic memory allocation; 13. Memory management; 14. The static keyword, multiple and virtual inheritance, templates and the STL library; 15. Creating a Java development environment; 16. Basic Java programming constructs; 17. Java classes and objects; 18. Advanced Java features; 19. Introductory numerical analysis; 20. Linear algebra; 21. Fourier transforms; 22. Differential equations; 23. Monte-Carlo methods; 24. Parabolic partial differential equation solvers; Index.

  10. Topological properties of robust biological and computational networks

    PubMed Central

    Navlakha, Saket; He, Xin; Faloutsos, Christos; Bar-Joseph, Ziv

    2014-01-01

    Network robustness is an important principle in biology and engineering. Previous studies of global networks have identified both redundancy and sparseness as topological properties used by robust networks. By focusing on molecular subnetworks, or modules, we show that module topology is tightly linked to the level of environmental variability (noise) the module expects to encounter. Modules internal to the cell that are less exposed to environmental noise are more connected and less robust than external modules. A similar design principle is used by several other biological networks. We propose a simple change to the evolutionary gene duplication model which gives rise to the rich range of module topologies observed within real networks. We apply these observations to evaluate and design communication networks that are specifically optimized for noisy or malicious environments. Combined, joint analysis of biological and computational networks leads to novel algorithms and insights benefiting both fields. PMID:24789562

  11. Recurrent Neural Network for Computing Outer Inverse.

    PubMed

    Živković, Ivan S; Stanimirović, Predrag S; Wei, Yimin

    2016-05-01

    Two linear recurrent neural networks for generating outer inverses with prescribed range and null space are defined. Each of the proposed recurrent neural networks is based on the matrix-valued differential equation, a generalization of dynamic equations proposed earlier for the nonsingular matrix inversion, the Moore-Penrose inversion, as well as the Drazin inversion, under the condition of zero initial state. The application of the first approach is conditioned by the properties of the spectrum of a certain matrix; the second approach eliminates this drawback, though at the cost of increasing the number of matrix operations. The cases corresponding to the most common generalized inverses are defined. The conditions that ensure stability of the proposed neural network are presented. Illustrative examples present the results of numerical simulations. PMID:26890345

  12. Realistic computer network simulation for network intrusion detection dataset generation

    NASA Astrophysics Data System (ADS)

    Payer, Garrett

    2015-05-01

    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  13. Challenges for high-performance networking for exascale computing.

    SciTech Connect

    Barrett, Brian W.; Hemmert, K. Scott; Underwood, Keith Douglas; Brightwell, Ronald Brian

    2010-05-01

    Achieving the next three orders of magnitude performance increase to move from petascale to exascale computing will require a significant advancements in several fundamental areas. Recent studies have outlined many of the challenges in hardware and software that will be needed. In this paper, we examine these challenges with respect to high-performance networking. We describe the repercussions of anticipated changes to computing and networking hardware and discuss the impact that alternative parallel programming models will have on the network software stack. We also present some ideas on possible approaches that address some of these challenges.

  14. Culture, Role and Group Work: A Social Network Analysis Perspective on an Online Collaborative Course

    ERIC Educational Resources Information Center

    Stepanyan, Karen; Mather, Richard; Dalrymple, Roger

    2014-01-01

    This paper discusses the patterns of network dynamics within a multicultural online collaborative learning environment. It analyses the interaction of participants (both students and facilitators) within a discussion board that was established as part of a 3-month online collaborative course. The study employs longitudinal probabilistic social…

  15. Design of a Competitive and Collaborative Learning Strategy in a Communication Networks Course

    ERIC Educational Resources Information Center

    Regueras, L. M.; Verdu, E.; Verdu, M. J.; de Castro, J. P.

    2011-01-01

    In this paper, an educational methodology based on collaborative and competitive learning is proposed. The suggested approach has been successfully applied to an undergraduate communication networks course, which is part of the core curriculum of the three-year degree in telecommunications engineering at the University of Valladolid in Spain. This…

  16. Life-Course Events, Social Networks, and the Emergence of Violence among Female Gang Members

    ERIC Educational Resources Information Center

    Fleisher, Mark S.; Krienert, Jessie L.

    2004-01-01

    Using data gathered from a multi-year field study, this article identifies specific life-course events shared by gang-affiliated women. Gangs emerge as a cultural adaptation or pro-social community response to poverty and racial isolation. Through the use of a social-network approach, data show that violence dramatically increases in the period…

  17. Interactive knowledge networks for interdisciplinary course navigation within Moodle.

    PubMed

    Scherl, Andre; Dethleffsen, Kathrin; Meyer, Michael

    2012-12-01

    Web-based hypermedia learning environments are widely used in modern education and seem particularly well suited for interdisciplinary learning. Previous work has identified guidance through these complex environments as a crucial problem of their acceptance and efficiency. We reasoned that map-based navigation might provide straightforward and effortless orientation. To achieve this, we developed a clickable and user-oriented concept map-based navigation plugin. This tool is implemented as an extension of Moodle, a widely used learning management system. It visualizes inner and interdisciplinary relations between learning objects and is generated dynamically depending on user set parameters and interactions. This plugin leaves the choice of navigation type to the user and supports direct guidance. Previously developed and evaluated face-to-face interdisciplinary learning materials bridging physiology and physics courses of a medical curriculum were integrated as learning objects, the relations of which were defined by metadata. Learning objects included text pages, self-assessments, videos, animations, and simulations. In a field study, we analyzed the effects of this learning environment on physiology and physics knowledge as well as the transfer ability of third-term medical students. Data were generated from pre- and posttest questionnaires and from tracking student navigation. Use of the hypermedia environment resulted in a significant increase of knowledge and transfer capability. Furthermore, the efficiency of learning was enhanced. We conclude that hypermedia environments based on Moodle and enriched by concept map-based navigation tools can significantly support interdisciplinary learning. Implementation of adaptivity may further strengthen this approach. PMID:23209009

  18. The CREATE Network (Computer Resource Educational Access in Tennessee Education).

    ERIC Educational Resources Information Center

    Moon, Fletcher F.

    The CREATE Network (Computer Resource Educational Access in Tennessee Education) brought together library professionals from Tennessee's seven historically black colleges and universities (HBCUs) for purposes of training and implementation of library applications of computer-based information technology. Annual training seminars were held at…

  19. BECUN. The Educational Computer User's Network at Battelle.

    ERIC Educational Resources Information Center

    Battelle Memorial Inst., Columbus, OH.

    The Educational Computer User's Network at Battelle Columbus Laboratories is a cooperative computer center effort between a group of Ohio colleges, secondary schools, and a large research-oriented organization. This description of the program includes the historical background, program concept, data processing development, hardware and software,…

  20. Linear circuits for neural networks and affective computing.

    PubMed

    Frenger, P

    1999-01-01

    Biological phenomena are often modeled with software on digital computers, even though the events may be analog in nature. The author describes the use of linear circuitry in two areas of biological simulation: artificial neural networks and affective computing. The operational amplifier, with the assistance of some new analog chips and simple digital microcontrollers, is featured prominently in these linear designs. PMID:11143356

  1. Computer program for compressible flow network analysis

    NASA Technical Reports Server (NTRS)

    Wilton, M. E.; Murtaugh, J. P.

    1973-01-01

    Program solves problem of an arbitrarily connected one dimensional compressible flow network with pumping in the channels and momentum balancing at flow junctions. Program includes pressure drop calculations for impingement flow and flow through pin fin arrangements, as currently found in many air cooled turbine bucket and vane cooling configurations.

  2. Synchronizing computer clocks using a local area network

    NASA Technical Reports Server (NTRS)

    Levine, Judah

    1990-01-01

    Researchers completed the first tests of a method to synchronize the clocks of networked computers to the National Institute of Standards and Technology (NIST) time scale. The method uses a server computer to disseminate the time to other clients on the same local-area network. The server is synchronized to NIST using the ACTS protocol over a dial-up telephone line. The software in both the server and the parameters of this model are used to adjust the time of the local clock and the interval between calibration requests in a statistically optimum way. The algorithm maximizes the time between calibrations while at the same time keeping the time of the local clock correct within a specific tolerance. The method can be extended to synchronize computers linked over wide-area networks, and an experiment to test the performance of the algorithms over such networks is being planned.

  3. Signaling networks: information flow, computation, and decision making.

    PubMed

    Azeloglu, Evren U; Iyengar, Ravi

    2015-04-01

    Signaling pathways come together to form networks that connect receptors to many different cellular machines. Such networks not only receive and transmit signals but also process information. The complexity of these networks requires the use of computational models to understand how information is processed and how input-output relationships are determined. Two major computational approaches used to study signaling networks are graph theory and dynamical modeling. Both approaches are useful; network analysis (application of graph theory) helps us understand how the signaling network is organized and what its information-processing capabilities are, whereas dynamical modeling helps us determine how the system changes in time and space upon receiving stimuli. Computational models have helped us identify a number of emergent properties that signaling networks possess. Such properties include ultrasensitivity, bistability, robustness, and noise-filtering capabilities. These properties endow cell-signaling networks with the ability to ignore small or transient signals and/or amplify signals to drive cellular machines that spawn numerous physiological functions associated with different cell states. PMID:25833842

  4. [Research toward a heterogeneous networked computing cluster

    SciTech Connect

    Duke, D.W.; Green, T.P.

    1998-08-11

    Over the last year the Systems Development Group, SDG, has been involved in a number of projects. The primary projects include extending the UNIX version of DQS, a DCE version of DQS, a Java based queuing system, a Computer Aided Learning and Instruction model and working with the Florida Department of Law Enforcement in the formation of the Florida Computer Crime Center. Additionally SDG has assisted a number of state and local agencies. A synopsis of these projects is contained in this report.

  5. Home Care Nursing via Computer Networks: Justification and Design Specifications

    PubMed Central

    Brennan, Patricia Flatley

    1988-01-01

    High-tech home care includes the use of information technologies, such as computer networks, to provide direct care to patients in the home. This paper presents the justification and design of a project using a free, public access computer network to deliver home care nursing. The intervention attempts to reduce isolation and improve problem solving among home care patients and their informal caregivers. Three modules comprise the intervention: a decision module, a communications module, and an information data base. This paper describes the experimental evaluation of the project, and discusses issues in the delivery of nursing care via computers.

  6. Coherent Computing with Injection-Locked Laser Network

    NASA Astrophysics Data System (ADS)

    Utsunomiya, S.; Wen, K.; Takata, K.; Tamate, S.; Yamamoto, Yoshihisa

    Combinatorial optimization problems are ubiquitous in our modern life. The classic examples include the protein folding in biology and medicine, the frequency assignment in wireless communications, traffic control and routing in air and on surface, microprocessor circuit design, computer vision and graph cut in machine learning, and social network control. They often belong to NP, NP-complete and NP-hard classes, for which modern digital computers and future quantum computers cannot find solutions efficiently, i.e. in polynomial time [1].

  7. Integrated evolutionary computation neural network quality controller for automated systems

    SciTech Connect

    Patro, S.; Kolarik, W.J.

    1999-06-01

    With increasing competition in the global market, more and more stringent quality standards and specifications are being demands at lower costs. Manufacturing applications of computing power are becoming more common. The application of neural networks to identification and control of dynamic processes has been discussed. The limitations of using neural networks for control purposes has been pointed out and a different technique, evolutionary computation, has been discussed. The results of identifying and controlling an unstable, dynamic process using evolutionary computation methods has been presented. A framework for an integrated system, using both neural networks and evolutionary computation, has been proposed to identify the process and then control the product quality, in a dynamic, multivariable system, in real-time.

  8. TimeXNet: Identifying active gene sub-networks using time-course gene expression profiles

    PubMed Central

    2014-01-01

    Background Time-course gene expression profiles are frequently used to provide insight into the changes in cellular state over time and to infer the molecular pathways involved. When combined with large-scale molecular interaction networks, such data can provide information about the dynamics of cellular response to stimulus. However, few tools are currently available to predict a single active gene sub-network from time-course gene expression profiles. Results We introduce a tool, TimeXNet, which identifies active gene sub-networks with temporal paths using time-course gene expression profiles in the context of a weighted gene regulatory and protein-protein interaction network. TimeXNet uses a specialized form of the network flow optimization approach to identify the most probable paths connecting the genes with significant changes in expression at consecutive time intervals. TimeXNet has been extensively evaluated for its ability to predict novel regulators and their associated pathways within active gene sub-networks in the mouse innate immune response and the yeast osmotic stress response. Compared to other similar methods, TimeXNet identified up to 50% more novel regulators from independent experimental datasets. It predicted paths within a greater number of known pathways with longer overlaps (up to 7 consecutive edges) within these pathways. TimeXNet was also shown to be robust in the presence of varying amounts of noise in the molecular interaction network. Conclusions TimeXNet is a reliable tool that can be used to study cellular response to stimuli through the identification of time-dependent active gene sub-networks in diverse biological systems. It is significantly better than other similar tools. TimeXNet is implemented in Java as a stand-alone application and supported on Linux, MS Windows and Macintosh. The output of TimeXNet can be directly viewed in Cytoscape. TimeXNet is freely available for non-commercial users. PMID:25522063

  9. Creation of a Course in Computer Methods and Modeling for Undergraduate Earth Science Programs

    NASA Astrophysics Data System (ADS)

    Menking, K. M.; Dashnaw, J. M.

    2003-12-01

    In recent years computer modeling has gained importance in geological research as a means to generate and test hypotheses and to allow simulation of processes in places inaccessible to humans (e.g., outer core fluid dynamics), too slow to permit observation (e.g., erosionally-induced uplift of topography), or too large to facilitate construction of physical models (e.g., faulting on the San Andreas). Entire fields within the Earth sciences now exist in which computer modeling has become the core work of the discipline. Undergraduate geology/Earth science programs have been slow to adapt to this change, and computer science curricular offerings often do not meet geology students' needs. To address these problems, a course in Computer Methods and Modeling in the Earth Sciences is being developed at Vassar College. The course uses the STELLA iconographical box modeling software developed by High Performance Systems, Inc. to teach students the fundamentals of dynamical systems modeling and then builds on the knowledge students have constructed with STELLA to teach introductory computer programming in Fortran. Fully documented and debugged STELLA and Fortran models along with reading lists, answer keys, and course notes are being developed for distribution to anyone interested in teaching a course such as this. Modeling topics include U-Pb concordia/discordia dating techniques, the global phosphorus cycle, Earth's energy balance and temperature, the impact of climate change on a chain of lakes in eastern California, heat flow in permafrost, and flow of ice in glaciers by plastic deformation. The course has been taught twice at Vassar and has been enthusiastically received by students who reported not only that they enjoyed learning the process of modeling, but also that they had a newfound appreciation for the role of mathematics in geology and intended to enroll in more math courses in the future.

  10. Proteus: a reconfigurable computational network for computer vision

    NASA Astrophysics Data System (ADS)

    Haralick, Robert M.; Somani, Arun K.; Wittenbrink, Craig M.; Johnson, Robert; Cooper, Kenneth; Shapiro, Linda G.; Phillips, Ihsin T.; Hwang, Jenq N.; Cheung, William; Yao, Yung H.; Chen, Chung-Ho; Yang, Larry; Daugherty, Brian; Lorbeski, Bob; Loving, Kent; Miller, Tom; Parkins, Larye; Soos, Steven L.

    1992-04-01

    The Proteus architecture is a highly parallel MIMD, multiple instruction, multiple-data machine, optimized for large granularity tasks such as machine vision and image processing The system can achieve 20 Giga-flops (80 Giga-flops peak). It accepts data via multiple serial links at a rate of up to 640 megabytes/second. The system employs a hierarchical reconfigurable interconnection network with the highest level being a circuit switched Enhanced Hypercube serial interconnection network for internal data transfers. The system is designed to use 256 to 1,024 RISC processors. The processors use one megabyte external Read/Write Allocating Caches for reduced multiprocessor contention. The system detects, locates, and replaces faulty subsystems using redundant hardware to facilitate fault tolerance. The parallelism is directly controllable through an advanced software system for partitioning, scheduling, and development. System software includes a translator for the INSIGHT language, a parallel debugger, low and high level simulators, and a message passing system for all control needs. Image processing application software includes a variety of point operators neighborhood, operators, convolution, and the mathematical morphology operations of binary and gray scale dilation, erosion, opening, and closing.

  11. A computational model for cancer growth by using complex networks

    NASA Astrophysics Data System (ADS)

    Galvão, Viviane; Miranda, José G. V.

    2008-09-01

    In this work we propose a computational model to investigate the proliferation of cancerous cell by using complex networks. In our model the network represents the structure of available space in the cancer propagation. The computational scheme considers a cancerous cell randomly included in the complex network. When the system evolves the cells can assume three states: proliferative, non-proliferative, and necrotic. Our results were compared with experimental data obtained from three human lung carcinoma cell lines. The computational simulations show that the cancerous cells have a Gompertzian growth. Also, our model simulates the formation of necrosis, increase of density, and resources diffusion to regions of lower nutrient concentration. We obtain that the cancer growth is very similar in random and small-world networks. On the other hand, the topological structure of the small-world network is more affected. The scale-free network has the largest rates of cancer growth due to hub formation. Finally, our results indicate that for different average degrees the rate of cancer growth is related to the available space in the network.

  12. UCLA PUNNS --A Neural Network Machine For Computer Vision

    NASA Astrophysics Data System (ADS)

    Gungner, David; Skrzypek, Josef

    1987-06-01

    The sequential processing paradigm limits current solutions for computer vision by restricting the number of functions which naturally map onto Von Neumann computing architectures. A variety of physical computing structures underlie the massive parallelism inherent in many visual functions. Therefore, further advances in general purpose vision must assume inseparability of function from structure. To combine function and structure we are investigating connectionist architectures using PUNNS (Perception Using Neural Network Simulation). Our approach is inspired and constrained by the analysis of visual functions that are computed in the neural networks of living things. PUNNS represents a massively parallel computer architecture which is evolving to allow the execution of certain visual functions in constant time, regardless of the size and complexity of the image. Due to the complexity and cost of building a neural net machine, a flexible neural net simulator is needed to invent, study and understand the behavior of complex vision algorithms. Some of the issues involved in building a simulator are how to compactly describe the interconnectivity of the neural network, how to input image data, how to program the neural network, and how to display the results of the network. This paper describes the implementation of PUNNS. Simulation examples and a comparison of PUNNS to other neural net simulators will be presented.

  13. Chaotic Behavior in Computer Mediated Network Communication.

    ERIC Educational Resources Information Center

    Snyder, Herbert; Kurtze, Douglas

    1996-01-01

    Examines the use of chaos theory in modelling time series data generated by computer-mediated communication (CMC). Data generated by CMC discussion groups are examined for the presence of chaotic behavior and to assess the variance which can be accounted for by the deterministic mechanism. (Author/LRW)

  14. Modelling amorphous computations with transcription networks.

    PubMed

    Simpson, Zack Booth; Tsai, Timothy L; Nguyen, Nam; Chen, Xi; Ellington, Andrew D

    2009-08-01

    The power of electronic computation is due in part to the development of modular gate structures that can be coupled to carry out sophisticated logical operations and whose performance can be readily modelled. However, the equivalences between electronic and biochemical operations are far from obvious. In order to help cross between these disciplines, we develop an analogy between complementary metal oxide semiconductor and transcriptional logic gates. We surmise that these transcriptional logic gates might prove to be useful in amorphous computations and model the abilities of immobilized gates to form patterns. Finally, to begin to implement these computations, we design unique hairpin transcriptional gates and then characterize these gates in a binary latch similar to that already demonstrated by Kim et al. (Kim, White & Winfree 2006 Mol. Syst. Biol. 2, 68 (doi:10.1038/msb4100099)). The hairpin transcriptional gates are uniquely suited to the design of a complementary NAND gate that can serve as an underlying basis of molecular computing that can output matter rather than electronic information. PMID:19474083

  15. Modelling amorphous computations with transcription networks

    PubMed Central

    Simpson, Zack Booth; Tsai, Timothy L.; Nguyen, Nam; Chen, Xi; Ellington, Andrew D.

    2009-01-01

    The power of electronic computation is due in part to the development of modular gate structures that can be coupled to carry out sophisticated logical operations and whose performance can be readily modelled. However, the equivalences between electronic and biochemical operations are far from obvious. In order to help cross between these disciplines, we develop an analogy between complementary metal oxide semiconductor and transcriptional logic gates. We surmise that these transcriptional logic gates might prove to be useful in amorphous computations and model the abilities of immobilized gates to form patterns. Finally, to begin to implement these computations, we design unique hairpin transcriptional gates and then characterize these gates in a binary latch similar to that already demonstrated by Kim et al. (Kim, White & Winfree 2006 Mol. Syst. Biol. 2, 68 (doi:10.1038/msb4100099)). The hairpin transcriptional gates are uniquely suited to the design of a complementary NAND gate that can serve as an underlying basis of molecular computing that can output matter rather than electronic information. PMID:19474083

  16. Computer-Communications Networks and Teletraffic.

    ERIC Educational Resources Information Center

    Switzer, I.

    Bi-directional cable TV (CATV) systems that are being installed today may not be well suited for computer communications. Older CATV systems are being modified to bi-directional transmission and most new systems are being built with bi-directional capability included. The extreme bandwidth requirement for carrying 20 or more TV channels on a…

  17. Measuring study time distributions: implications for designing computer-based courses.

    PubMed

    Taraban, R; Maki, W S; Rynearson, K

    1999-05-01

    In both traditional lecture-test courses and courses delivered over the World-Wide Web (WWW), both beginning and experienced college students reported studying almost exclusively just before exams. Automatic measures (computer records, WWW page hits, and electronic mail archives) confirmed the self-reported distributions of study times. Weekly deadlines produced weekly volleys of taking on-line quizzes, a pattern that was reflected in self-reports of study times. However, on-line study materials were used primarily for review for regularly scheduled in-class exams. Thus, regardless of course format, students engaged in massed practice and did not experience study aids at appropriate times. Computer technology provides new forms of learning for students, as well as opportunities for instructors to observe patterns of student study time. Management of instructional contingencies will be necessary to bring students into contact with the rich cognitive aids enabled by technology. PMID:10495808

  18. Neuronal and network computation in the brain

    SciTech Connect

    Babloyantz, A.

    1999-03-22

    The concepts and methods of non-linear dynamics have been a powerful tool for studying some gamow aspects of brain dynamics. In this paper we show how, from time series analysis of electroencepholograms in sick and healthy subjects, chaotic nature of brain activity could be unveiled. This finding gave rise to the concept of spatiotemporal cortical chaotic networks which in turn was the foundation for a simple brain-like device which is able to become attentive, perform pattern recognition and motion detection. A new method of time series analysis is also proposed which demonstrates for the first time the existence of neuronal code in interspike intervals of coclear cells.

  19. The Development and Presentation of Four Different College Courses by Computer Teleprocessing. Interim Report.

    ERIC Educational Resources Information Center

    Mitzel, Harold E.; Wodtke, Kenneth H.

    A computer-assisted instruction (CAI) project undertaken in 1965 sought to: 1) teach college instructors to prepare quality CAI curricula; 2) ascertain student attitudes toward CAI; 3) compare CAI with the lecture method; and 4) demonstrate prototypical CAI courses. Teachers were successfully trained in the use of Coursewriter and prepared courses…

  20. A Treatment of Computational Precision, Number Representation, and Large Integers in an Introductory Fortran Course

    ERIC Educational Resources Information Center

    Richardson, William H., Jr.

    2006-01-01

    Computational precision is sometimes given short shrift in a first programming course. Treating this topic requires discussing integer and floating-point number representations and inaccuracies that may result from their use. An example of a moderately simple programming problem from elementary statistics was examined. It forced students to

  1. Redefining "Communication" for the Basic Course Student: Helping Undergraduates to Conceive of Computer Messages as Communication.

    ERIC Educational Resources Information Center

    Minch, Kevin M.

    In this pivotal time in the 20th-century electronic revolution, when electronic communication is becoming more widespread and affordable, it is certainly worth while to consider the implications that computer mediated communication has for the basic course student's understanding of the communication process. There is a growing need to address…

  2. Maintaining Pedagogical Integrity of a Computer Mediated Course Delivery in Social Foundations

    ERIC Educational Resources Information Center

    Stewart, Shelley; Cobb-Roberts, Deirdre; Shircliffe, Barbara J.

    2013-01-01

    Transforming a face to face course to a computer mediated format in social foundations (interdisciplinary field in education), while maintaining pedagogical integrity, involves strategic collaboration between instructional technologists and content area experts. This type of planned partnership requires open dialogue and a mutual respect for prior…

  3. Exploring Interactive and Dynamic Simulations Using a Computer Algebra System in an Advanced Placement Chemistry Course

    ERIC Educational Resources Information Center

    Matsumoto, Paul S.

    2014-01-01

    The article describes the use of Mathematica, a computer algebra system (CAS), in a high school chemistry course. Mathematica was used to generate a graph, where a slider controls the value of parameter(s) in the equation; thus, students can visualize the effect of the parameter(s) on the behavior of the system. Also, Mathematica can show the

  4. Enhancing Learning in Introductory Computer Science Courses through SCALE: An Empirical Study

    ERIC Educational Resources Information Center

    Verginis, I.; Gogoulou, A.; Gouli, E.; Boubouka, M.; Grigoriadou, M.

    2011-01-01

    The work presented in this paper aims to support and promote the learning process in introductory computer science courses through the Web-based, adaptive, activity-oriented learning environment known as Supporting Collaboration and Adaptation in a Learning Environment (SCALE). The environment engages students actively in the learning process and

  5. Applying Computer-Assisted Musical Instruction to Music Appreciation Course: An Example with Chinese Musical Instruments

    ERIC Educational Resources Information Center

    Lou, Shi-Jer; Guo, Yuan-Chang; Zhu, Yi-Zhen; Shih, Ru-Chu; Dzan, Wei-Yuan

    2011-01-01

    This study aims to explore the effectiveness of computer-assisted musical instruction (CAMI) in the Learning Chinese Musical Instruments (LCMI) course. The CAMI software for Chinese musical instruments was developed and administered to 228 students in a vocational high school. A pretest-posttest non-equivalent control group design with three…

  6. Development of Online Cognitive and Algorithm Tests as Assessment Tools in Introductory Computer Science Courses

    ERIC Educational Resources Information Center

    Avancena, Aimee Theresa; Nishihara, Akinori; Vergara, John Paul

    2012-01-01

    This paper presents the online cognitive and algorithm tests, which were developed in order to determine if certain cognitive factors and fundamental algorithms correlate with the performance of students in their introductory computer science course. The tests were implemented among Management Information Systems majors from the Philippines and…

  7. Introducing Creativity in a Design Laboratory for a Freshman Level Electrical and Computer Engineering Course

    ERIC Educational Resources Information Center

    Burkett, Susan L.; Kotru, Sushma; Lusth, John C.; McCallum, Debra; Dunlap, Sarah

    2014-01-01

    Dunlap, The University of Alabama, USA ABSTRACT In the electrical and computer engineering (ECE) curriculum at The University of Alabama, freshmen are introduced to fundamental electrical concepts and units, DC circuit analysis techniques, operational amplifiers, circuit simulation, design, and professional ethics. The two credit course has both…

  8. Cognitive Learning Styles and Academic Performance in Two Postsecondary Computer Application Courses.

    ERIC Educational Resources Information Center

    Ross, Jonathan L.; Drysdale, Maureen T. B.; Schultz, Robert A.

    2001-01-01

    Investigated effects of cognitive learning style on academic performance in two university computer applications courses. Discusses use of the Gregorc Style Delineator to collect learning style information over a four-year period. Results indicated a significant effect of learning style on academic performance, and that sequential learners…

  9. A Survey of Knowledge Management Skills Acquisition in an Online Team-Based Distributed Computing Course

    ERIC Educational Resources Information Center

    Thomas, Jennifer D. E.

    2007-01-01

    This paper investigates students' perceptions of their acquisition of knowledge management skills, namely thinking and team-building skills, resulting from the integration of various resources and technologies into an entirely team-based, online upper level distributed computing (DC) information systems (IS) course. Results seem to indicate that…

  10. A Comparison of the Educational Effectiveness of Online versus In-Class Computer Literacy Courses

    ERIC Educational Resources Information Center

    Heithecker, Julia Ann

    2013-01-01

    The purpose of this quantitative study was to compare the educational effectiveness of online versus in-class computer literacy courses, and examine the impact, if any, of student demographics (delimited to gender, age, work status, father and mother education, and enrollment status). Institutions are seeking ways to produce technologically…

  11. Programming Languages or Generic Software Tools, for Beginners' Courses in Computer Literacy?

    ERIC Educational Resources Information Center

    Neuwirth, Erich

    1987-01-01

    Discussion of methods that can be used to teach beginner courses in computer literacy focuses on students aged 10-12. The value of using a programing language versus using a generic software package is highlighted; Logo and Prolog are reviewed; and the use of databases is discussed. (LRW)

  12. The MORPG-Based Learning System for Multiple Courses: A Case Study on Computer Science Curriculum

    ERIC Educational Resources Information Center

    Liu, Kuo-Yu

    2015-01-01

    This study aimed at developing a Multiplayer Online Role Playing Game-based (MORPG) Learning system which enabled instructors to construct a game scenario and manage sharable and reusable learning content for multiple courses. It used the curriculum of "Introduction to Computer Science" as a study case to assess students' learning…

  13. Computer-Assisted Evaluation of Speaking Competencies in the Basic Speech Course.

    ERIC Educational Resources Information Center

    Sawyer, Chris R.; Behnke, Ralph R.

    2001-01-01

    Addresses concerns when a college-level course utilizes a number of instructors and sections. Notes the importance of the various sections receiving essentially the same educational experience. Describes section variation trends. Discusses use of the computer assisted speech evaluation software at Texas Christian University. Recommends the use of…

  14. Use of Standardized Test Scores to Predict Success in a Computer Applications Course

    ERIC Educational Resources Information Center

    Harris, Robert V.; King, Stephanie B.

    2016-01-01

    The purpose of this study was to see if a relationship existed between American College Testing (ACT) scores (i.e., English, reading, mathematics, science reasoning, and composite) and student success in a computer applications course at a Mississippi community college. The study showed that while the ACT scores were excellent predictors of

  15. Multimedia Instructional Tools' Impact on Student Motivation and Learning Strategies in Computer Applications Courses

    ERIC Educational Resources Information Center

    Chapman, Debra; Wang, Shuyan

    2015-01-01

    Multimedia instructional tools (MMIT) have been identified as a way effectively and economically present instructional material. MMITs are commonly used in introductory computer applications courses as MMITs should be effective in increasing student knowledge and positively impact motivation and learning strategies, without increasing costs. This…

  16. Performance Measures in Courses Using Computer-Aided Personalized System of Instruction

    ERIC Educational Resources Information Center

    Springer, C. R.; Pear, J. J.

    2008-01-01

    Archived data from four courses taught with computer-aided personalized system of instruction (CAPSI)--an online, self-paced, instructional program--were used to explore the relationship between objectively rescored final exam grades, peer reviewing, and progress rate--i.e., the rate at which students completed unit tests. There was a strong…

  17. Assessing the Impact of a Computer-Based College Algebra Course

    ERIC Educational Resources Information Center

    Ye, Ningjun

    2010-01-01

    USM piloted the Math Zone in Spring 2007, a computer-based program in teaching MAT 101 and MAT 099 in order to improve student performance. This research determined the effect of the re-design of MAT 101 on student achievements in comparison to a traditional approach to the same course. Meanwhile, the study investigated possible effects of the…

  18. WebStars: Holistic, Arts-Based College Curriculum in a Computer Applications Course

    ERIC Educational Resources Information Center

    Karsten, Selia

    2004-01-01

    The purpose of my qualitative, action study was to gain a better understanding of the effects of an experimental college course in computer applications. This inquiry was made concerning both the teacher's and learners' points of view. A holistic, arts-based approach was used by the researcher/teacher in order to design, develop and facilitate a…

  19. Developing and Validating Test Items for First-Year Computer Science Courses

    ERIC Educational Resources Information Center

    Vahrenhold, Jan; Paul, Wolfgang

    2014-01-01

    We report on the development, validation, and implementation of a collection of test items designed to detect misconceptions related to first-year computer science courses. To this end, we reworked the development scheme proposed by Almstrum et al. ("SIGCSE Bulletin" 38(4):132-145, 2006) to include students' artifacts and to…

  20. Enhancing Learning in Introductory Computer Science Courses through SCALE: An Empirical Study

    ERIC Educational Resources Information Center

    Verginis, I.; Gogoulou, A.; Gouli, E.; Boubouka, M.; Grigoriadou, M.

    2011-01-01

    The work presented in this paper aims to support and promote the learning process in introductory computer science courses through the Web-based, adaptive, activity-oriented learning environment known as Supporting Collaboration and Adaptation in a Learning Environment (SCALE). The environment engages students actively in the learning process and…

  1. An Assessment of the "Diploma in Computer Engineering" Course in the Technical Education System in Nepal

    ERIC Educational Resources Information Center

    Basnet, Kul Bahadur; Kim, Jinsoo

    2010-01-01

    The purpose of this study was to assess the Diploma in Computer Engineering (DCE) courses offered at affiliated schools of the Council for Technical Education and Vocational Training (CTEVT) with a focus on the goals of the curriculum and employment opportunities. Document analysis, questionnaires, focus group discussions and semi-structured…

  2. Performance Measures in Courses Using Computer-Aided Personalized System of Instruction

    ERIC Educational Resources Information Center

    Springer, C. R.; Pear, J. J.

    2008-01-01

    Archived data from four courses taught with computer-aided personalized system of instruction (CAPSI)--an online, self-paced, instructional program--were used to explore the relationship between objectively rescored final exam grades, peer reviewing, and progress rate--i.e., the rate at which students completed unit tests. There was a strong

  3. A Study on the Methods of Assessment and Strategy of Knowledge Sharing in Computer Course

    ERIC Educational Resources Information Center

    Chan, Pat P. W.

    2014-01-01

    With the advancement of information and communication technology, collaboration and knowledge sharing through technology is facilitated which enhances the learning process and improves the learning efficiency. The purpose of this paper is to review the methods of assessment and strategy of collaboration and knowledge sharing in a computer course,…

  4. A Self-Study of Teaching Reform in a University Business Computing Course.

    ERIC Educational Resources Information Center

    Williams, Mark Campbell

    2000-01-01

    The author recounts a qualitative investigation of the influence of an open-discourse reform effort on technicism in a college-level computing course which was discontinued when the study was seen to be unethical. A psychology-oriented heuristic inquiry into the causes of this failure resulted in a growing awareness of the importance of art,…

  5. Distributed Training for the Reserve Component: Course Conversion and Implementation Guidelines for Computer Conferencing.

    ERIC Educational Resources Information Center

    Hahn, H. A.; And Others

    The purpose of this handbook is to provide background and guidelines for course designers and instructional developers who will be developing Reserve Component training for the United States military using asynchronous computer conferencing techniques. The recommendations in this report are based on an international review of the literature in…

  6. Exploring Interactive and Dynamic Simulations Using a Computer Algebra System in an Advanced Placement Chemistry Course

    ERIC Educational Resources Information Center

    Matsumoto, Paul S.

    2014-01-01

    The article describes the use of Mathematica, a computer algebra system (CAS), in a high school chemistry course. Mathematica was used to generate a graph, where a slider controls the value of parameter(s) in the equation; thus, students can visualize the effect of the parameter(s) on the behavior of the system. Also, Mathematica can show the…

  7. A Computer-Assisted-Instruction Course in Vocabulary Building through Latin and Greek Roots

    ERIC Educational Resources Information Center

    Scanlan, Richard T.

    1976-01-01

    A course in the enlargement of students' English vocabulary through the study of Latin and Greek roots and their derivatives was developed by the Department of Classics at the University of Illinois. The class makes use of computer assisted instruction on the PLATO IV system. (Author/RM)

  8. Use of Standardized Test Scores to Predict Success in a Computer Applications Course

    ERIC Educational Resources Information Center

    Harris, Robert V.; King, Stephanie B.

    2016-01-01

    The purpose of this study was to see if a relationship existed between American College Testing (ACT) scores (i.e., English, reading, mathematics, science reasoning, and composite) and student success in a computer applications course at a Mississippi community college. The study showed that while the ACT scores were excellent predictors of…

  9. Computer Simulation of the Alonso Household Location Model in the Microeconomics Course

    ERIC Educational Resources Information Center

    Bolton, Roger E.

    2005-01-01

    Computer simulation of the Alonso household location model can enrich the intermediate microeconomics course. The model includes decisions on location, land space, and other goods and is a valuable complement to the usual textbook model of household consumption. It has three decision variables, one of which is a "bad," and one good's price is a…

  10. Developing and Validating Test Items for First-Year Computer Science Courses

    ERIC Educational Resources Information Center

    Vahrenhold, Jan; Paul, Wolfgang

    2014-01-01

    We report on the development, validation, and implementation of a collection of test items designed to detect misconceptions related to first-year computer science courses. To this end, we reworked the development scheme proposed by Almstrum et al. ("SIGCSE Bulletin" 38(4):132-145, 2006) to include students' artifacts and to

  11. The MORPG-Based Learning System for Multiple Courses: A Case Study on Computer Science Curriculum

    ERIC Educational Resources Information Center

    Liu, Kuo-Yu

    2015-01-01

    This study aimed at developing a Multiplayer Online Role Playing Game-based (MORPG) Learning system which enabled instructors to construct a game scenario and manage sharable and reusable learning content for multiple courses. It used the curriculum of "Introduction to Computer Science" as a study case to assess students' learning

  12. Active and Collaborative Learning in an Introductory Electrical and Computer Engineering Course

    ERIC Educational Resources Information Center

    Kotru, Sushma; Burkett, Susan L.; Jackson, David Jeff

    2010-01-01

    Active and collaborative learning instruments were introduced into an introductory electrical and computer engineering course. These instruments were designed to assess specific learning objectives and program outcomes. Results show that students developed an understanding comparable to that of more advanced students assessed later in the…

  13. A Treatment of Computational Precision, Number Representation, and Large Integers in an Introductory Fortran Course

    ERIC Educational Resources Information Center

    Richardson, William H., Jr.

    2006-01-01

    Computational precision is sometimes given short shrift in a first programming course. Treating this topic requires discussing integer and floating-point number representations and inaccuracies that may result from their use. An example of a moderately simple programming problem from elementary statistics was examined. It forced students to…

  14. Active and Collaborative Learning in an Introductory Electrical and Computer Engineering Course

    ERIC Educational Resources Information Center

    Kotru, Sushma; Burkett, Susan L.; Jackson, David Jeff

    2010-01-01

    Active and collaborative learning instruments were introduced into an introductory electrical and computer engineering course. These instruments were designed to assess specific learning objectives and program outcomes. Results show that students developed an understanding comparable to that of more advanced students assessed later in the

  15. Community College Uses a Video-Game Lab to Lure Students to Computer Courses

    ERIC Educational Resources Information Center

    Young, Jeffrey R.

    2007-01-01

    A computer lab has become one of the most popular hangouts at Northern Virginia Community College after officials decided to load its PCs with popular video games, install a PlayStation and an Xbox, and declare it "for gamers only." The goal of this lab is to entice students to take game-design and other IT courses. John Min, dean of business…

  16. Formal Operations and Learning Style Predict Success in Statistics and Computer Science Courses.

    ERIC Educational Resources Information Center

    Hudak, Mary A.; Anderson, David E.

    1990-01-01

    Studies 94 undergraduate students in introductory statistics and computer science courses. Applies Formal Operations Reasoning Test (FORT) and Kolb's Learning Style Inventory (LSI). Finds that substantial numbers of students have not achieved the formal operation level of cognitive maturity. Emphasizes need to examine students learning style and…

  17. Computer Aided Instruction for a Course in Boolean Algebra and Logic Design. Final Report (Revised).

    ERIC Educational Resources Information Center

    Roy, Rob

    The use of computers to prepare deficient college and graduate students for courses that build upon previously acquired information would solve the growing problem of professors who must spend up to one third of their class time in review of material. But examination of students who were taught Boolean Algebra and Logic Design by means of Computer…

  18. Effects of Multidimensional Concept Maps on Fourth Graders' Learning in Web-Based Computer Course

    ERIC Educational Resources Information Center

    Huang, Hwa-Shan; Chiou, Chei-Chang; Chiang, Heien-Kun; Lai, Sung-Hsi; Huang, Chiun-Yen; Chou, Yin-Yu

    2012-01-01

    This study explores the effect of multidimensional concept mapping instruction on students' learning performance in a web-based computer course. The subjects consisted of 103 fourth graders from an elementary school in central Taiwan. They were divided into three groups: multidimensional concept map (MCM) instruction group, Novak concept map (NCM)…

  19. Integration of Major Computer Program Packages into Experimental Courses: A Freshman Experience.

    ERIC Educational Resources Information Center

    Lipschitz, Irving

    1981-01-01

    Describes the use of the Gaussian 70 computer programs to carry out quantum chemical calculations, including single calculations, geometry, optimization, and potential surface scans. Includes a summary of student activities and benefits for students in an honors freshman chemistry course. (SK)

  20. Measuring Computer Science Knowledge Level of Hungarian Students Specialized in Informatics with Romanian Students Attending a Science Course or a Mathematics-Informatics Course

    ERIC Educational Resources Information Center

    Kiss, Gabor

    2012-01-01

    An analysis of Information Technology knowledge of Hungarian and Romanian students was made with the help of a self developed web based Informatics Test. The goal of this research is an analysis of the Computer Science knowledge level of Hungarian and Romanian students attending a Science course or a Mathematics-Informatics course. Analysed was…

  1. Methodical Approaches to Teaching of Computer Modeling in Computer Science Course

    ERIC Educational Resources Information Center

    Rakhimzhanova, B. Lyazzat; Issabayeva, N. Darazha; Khakimova, Tiyshtik; Bolyskhanova, J. Madina

    2015-01-01

    The purpose of this study was to justify of the formation technique of representation of modeling methodology at computer science lessons. The necessity of studying computer modeling is that the current trends of strengthening of general education and worldview functions of computer science define the necessity of additional research of the…

  2. A Degenerate Optical Parametric Oscillator Network for Coherent Computation

    NASA Astrophysics Data System (ADS)

    Wang, Zhe; Marandi, Alireza; Takata, Kenta; Byer, Robert L.; Yamamoto, Yoshihisa

    Laws of physics have proved useful for solving combinatorial optimization problems. This chapter introduces a network of degenerate optical parametric oscillators which takes advantage of principles of quantum optics to tackle NP-hard problems. The underlying mechanism originates from the bistability of the output phase of each oscillator, coherent interactions between coupled oscillators, and the inherent preference of the network for oscillating in a mode with the minimum photon loss. Computational experiments have been extensively performed using instances of an NP-hard problem in graph theory with the number of vertices ranging from 4 to 20000. The numerical results clearly demonstrate the effectiveness of the network. In addition, the network can be physically implemented on a single ring cavity with multiple trains of femtosecond pulses and configurable mutual couplings. The implementation has been realized for the instance on the cubic graph with 4 vertices, and no computational error is detected in 1000 runs.

  3. Six networks on a universal neuromorphic computing substrate.

    PubMed

    Pfeil, Thomas; Grbl, Andreas; Jeltsch, Sebastian; Mller, Eric; Mller, Paul; Petrovici, Mihai A; Schmuker, Michael; Brderle, Daniel; Schemmel, Johannes; Meier, Karlheinz

    2013-01-01

    In this study, we present a highly configurable neuromorphic computing substrate and use it for emulating several types of neural networks. At the heart of this system lies a mixed-signal chip, with analog implementations of neurons and synapses and digital transmission of action potentials. Major advantages of this emulation device, which has been explicitly designed as a universal neural network emulator, are its inherent parallelism and high acceleration factor compared to conventional computers. Its configurability allows the realization of almost arbitrary network topologies and the use of widely varied neuronal and synaptic parameters. Fixed-pattern noise inherent to analog circuitry is reduced by calibration routines. An integrated development environment allows neuroscientists to operate the device without any prior knowledge of neuromorphic circuit design. As a showcase for the capabilities of the system, we describe the successful emulation of six different neural networks which cover a broad spectrum of both structure and functionality. PMID:23423583

  4. Computer aided nonlinear electrical networks analysis

    NASA Technical Reports Server (NTRS)

    Slapnicar, P.

    1977-01-01

    Techniques used in simulating an electrical circuit with nonlinear elements for use in computer-aided circuit analysis programs are described. Elements of the circuit include capacitors, resistors, inductors, transistors, diodes, and voltage and current sources (constant or time varying). Simulation features are discussed for dc, ac, and/or transient circuit analysis. Calculations are based on the model approach of formulating the circuit equations. A particular solution of transient analysis for nonlinear storage elements is described.

  5. Creating a two-layered augmented artificial immune system for application to computer network intrusion detection

    NASA Astrophysics Data System (ADS)

    Judge, Matthew G.; Lamont, Gary B.

    2009-05-01

    Computer network security has become a very serious concern of commercial, industrial, and military organizations due to the increasing number of network threats such as outsider intrusions and insider covert activities. An important security element of course is network intrusion detection which is a difficult real world problem that has been addressed through many different solution attempts. Using an artificial immune system has been shown to be one of the most promising results. By enhancing jREMISA, a multi-objective evolutionary algorithm inspired artificial immune system, with a secondary defense layer; we produce improved accuracy of intrusion classification and a flexibility in responsiveness. This responsiveness can be leveraged to provide a much more powerful and accurate system, through the use of increased processing time and dedicated hardware which has the flexibility of being located out of band.

  6. Distributed computation of graphics primitives on a transputer network

    NASA Technical Reports Server (NTRS)

    Ellis, Graham K.

    1988-01-01

    A method is developed for distributing the computation of graphics primitives on a parallel processing network. Off-the-shelf transputer boards are used to perform the graphics transformations and scan-conversion tasks that would normally be assigned to a single transputer based display processor. Each node in the network performs a single graphics primitive computation. Frequently requested tasks can be duplicated on several nodes. The results indicate that the current distribution of commands on the graphics network shows a performance degradation when compared to the graphics display board alone. A change to more computation per node for every communication (perform more complex tasks on each node) may cause the desired increase in throughput.

  7. Synchronization-based computation through networks of coupled oscillators

    PubMed Central

    Malagarriga, Daniel; García-Vellisca, Mariano A.; Villa, Alessandro E. P.; Buldú, Javier M.; García-Ojalvo, Jordi; Pons, Antonio J.

    2015-01-01

    The mesoscopic activity of the brain is strongly dynamical, while at the same time exhibits remarkable computational capabilities. In order to examine how these two features coexist, here we show that the patterns of synchronized oscillations displayed by networks of neural mass models, representing cortical columns, can be used as substrates for Boolean-like computations. Our results reveal that the same neural mass network may process different combinations of dynamical inputs as different logical operations or combinations of them. This dynamical feature of the network allows it to process complex inputs in a very sophisticated manner. The results are reproduced experimentally with electronic circuits of coupled Chua oscillators, showing the robustness of this kind of computation to the intrinsic noise and parameter mismatch of the coupled oscillators. We also show that the information-processing capabilities of coupled oscillations go beyond the simple juxtaposition of logic gates. PMID:26300765

  8. Computing Path Tables for Quickest Multipaths In Computer Networks

    SciTech Connect

    Grimmell, W.C.

    2004-12-21

    We consider the transmission of a message from a source node to a terminal node in a network with n nodes and m links where the message is divided into parts and each part is transmitted over a different path in a set of paths from the source node to the terminal node. Here each link is characterized by a bandwidth and delay. The set of paths together with their transmission rates used for the message is referred to as a multipath. We present two algorithms that produce a minimum-end-to-end message delay multipath path table that, for every message length, specifies a multipath that will achieve the minimum end-to-end delay. The algorithms also generate a function that maps the minimum end-to-end message delay to the message length. The time complexities of the algorithms are O(n{sup 2}((n{sup 2}/logn) + m)min(D{sub max}, C{sub max})) and O(nm(C{sub max} + nmin(D{sub max}, C{sub max}))) when the link delays and bandwidths are non-negative integers. Here D{sub max} and C{sub max} are respectively the maximum link delay and maximum link bandwidth and C{sub max} and D{sub max} are greater than zero.

  9. Distributed Computing and MEMS Accelerometers: The Quake Catcher Network

    NASA Astrophysics Data System (ADS)

    Lawrence, J. F.; Cochran, E. S.; Christensen, C.; Jakka, R. S.

    2008-12-01

    Recent advances in distributed computing provide exciting opportunities for seismic data collection. We are in the early stages of implementing a high density, low cost strong-motion network for rapid response and early warning by placing accelerometers in schools, homes, offices, government buildings, fire houses and more. The Quake Catcher Network (QCN) employs existing networked laptops and desktops to form a dense, distributed computing seismic network. Costs for this network are minimal because the QCN uses 1) strong motion sensors (accelerometers) already internal to many laptops and 2) low-cost universal serial bus (USB) accelerometers for use with desktops. The Berkeley Open Infrastructure for Network Computing (BOINC!) provides a free, proven paradigm for involving the public in large-scale computational research projects. The QCN leverages public participation to fully implement the seismic network. As such engaging the public to participate in seismic data collection is not only an integral part of the project, but an added value to the QCN. The software provides the client-user with a screen-saver displaying seismic data recorded on their laptop or recently detected earthquakes. Furthermore, this project installs sensors in K-12 classrooms as an educational tool for teaching science. Through a variety of interactive experiments students can learn about earthquakes and the hazards earthquakes pose. In the first six months of limited release of the QCN software, we successfully received triggers and waveforms from laptops near the M 4.7 April 25, 2008 earthquake in Reno, Nevada and the M 5.4 July 29, 2008 earthquake in Chino, California (as well as a few 3.6 and higher events). This fall we continued to expand the network further by installing seismometers in K-12 schools, museums, and government buildings in the greater Los Angeles basin and the San Francisco Bay Area. By summer 2009 we expect to have 1000 USB sensors deployed in California, in addition to any current or new laptop users.

  10. Building Social Networks with Computer Networks: A New Deal for Teaching and Learning.

    ERIC Educational Resources Information Center

    Thurston, Thomas

    2001-01-01

    Discusses the role of computer technology and Web sites in expanding social networks. Focuses on the New Deal Network using two examples: (1) uniting a Julia C. Lathrop Housing (Chicago, Illinois) resident with a university professor; and (2) saving the Hugo Gellert art murals at the Seward Park Coop Apartments (New York). (CMK)

  11. Microcosm to Cosmos: The Growth of a Divisional Computer Network

    PubMed Central

    Johannes, R.S.; Kahane, Stephen N.

    1987-01-01

    In 1982, we reported the deployment of a network of microcomputers in the Division of Gastroenterology[1]. This network was based upon Corvus Systems Omninet. Corvus was one of the very first firms to offer networking products for PC's. This PC development occurred coincident with the planning phase of the Johns Hopkins Hospital's multisegment ethernet project. A rich communications infra-structure is now in place at the Johns Hopkins Medical Institutions[2,3]. Shortly after the hospital development under the direction of the Operational and Clinical Systems Division (OCS) development began, the Johns Hopkins School of Medicine began an Integrated Academic Information Management Systems (IAIMS) planning effort. We now present a model that uses aspects of all three planning efforts (PC networks, Hospital Information Systems & IAIMS) to build a divisional computing facility. This facility is viewed as a terminal leaf on then institutional network diagram. Nevertheless, it is noteworthy that this leaf, the divisional resource in the Division of Gastroenterology (GASNET), has a rich substructure and functionality of its own, perhaps revealing the recursive nature of network architecture. The current status, design and function of the GASNET computational facility is discussed. Among the major positive aspects of this design are the sharing and centralization of MS-DOS software, the high-speed DOS/Unix link that makes available most of the our institution's computing resources.

  12. Examining the Impact of Teacher-Generated Feedback in Online Math Courses Where Computer-Assisted Instruction Is Embedded

    ERIC Educational Resources Information Center

    Hoey, Rebecca Simon

    2012-01-01

    Teacher feedback and interaction are factors of success and satisfaction in online courses, but courses designed for computer-assisted instruction (CAI) require less communication between a teacher and student. The goal of this research was to examine the impact of teachers' feedback in online self-paced secondary math courses where CAI was…

  13. Navigating Traditional Chinese Medicine Network Pharmacology and Computational Tools

    PubMed Central

    Chen, Jia-Lei; Xu, Li-Wen

    2013-01-01

    The concept of “network target” has ushered in a new era in the field of traditional Chinese medicine (TCM). As a new research approach, network pharmacology is based on the analysis of network models and systems biology. Taking advantage of advancements in systems biology, a high degree of integration data analysis strategy and interpretable visualization provides deeper insights into the underlying mechanisms of TCM theories, including the principles of herb combination, biological foundations of herb or herbal formulae action, and molecular basis of TCM syndromes. In this study, we review several recent developments in TCM network pharmacology research and discuss their potential for bridging the gap between traditional and modern medicine. We briefly summarize the two main functional applications of TCM network models: understanding/uncovering and predicting/discovering. In particular, we focus on how TCM network pharmacology research is conducted and highlight different computational tools, such as network-based and machine learning algorithms, and sources that have been proposed and applied to the different steps involved in the research process. To make network pharmacology research commonplace, some basic network definitions and analysis methods are presented. PMID:23983798

  14. Analytical Computation of the Epidemic Threshold on Temporal Networks

    NASA Astrophysics Data System (ADS)

    Valdano, Eugenio; Ferreri, Luca; Poletto, Chiara; Colizza, Vittoria

    2015-04-01

    The time variation of contacts in a networked system may fundamentally alter the properties of spreading processes and affect the condition for large-scale propagation, as encoded in the epidemic threshold. Despite the great interest in the problem for the physics, applied mathematics, computer science, and epidemiology communities, a full theoretical understanding is still missing and currently limited to the cases where the time-scale separation holds between spreading and network dynamics or to specific temporal network models. We consider a Markov chain description of the susceptible-infectious-susceptible process on an arbitrary temporal network. By adopting a multilayer perspective, we develop a general analytical derivation of the epidemic threshold in terms of the spectral radius of a matrix that encodes both network structure and disease dynamics. The accuracy of the approach is confirmed on a set of temporal models and empirical networks and against numerical results. In addition, we explore how the threshold changes when varying the overall time of observation of the temporal network, so as to provide insights on the optimal time window for data collection of empirical temporal networked systems. Our framework is of both fundamental and practical interest, as it offers novel understanding of the interplay between temporal networks and spreading dynamics.

  15. A network security case study; The Los Alamos National Laboratory integrated computer network

    SciTech Connect

    Dreicer, J.S.; Stoltz, L. )

    1991-01-01

    This paper reports on a study to validate the Graphical Network Representation (GRPHREP) model which is being conducted on the Los Alamos National Laboratory Integrated Computer Network (ICN). The GRPHREP model is a software system application based on graph theory and object-oriented programming methodologies. It codified the Department of Energy (DOE) Order 5637.1, which is concerned with classified computer secret policy, restrictions, and requirements. The Los Alamos ICN is required to control access to and support large-scale scientific and administrative computing. Thus, large-scale scientific and administrative computing. Thus we felt that this large, complex, and dynamic network would provide a good test for the graphical and functional capabilities of the model. Furthermore, the ICN is composed of multiple partitions that reflect the sensitivity and classification of the computation (data) and designate the required clearance level for the user.

  16. Test experience on an ultrareliable computer communication network

    NASA Technical Reports Server (NTRS)

    Abbott, L. W.

    1984-01-01

    The dispersed sensor processing mesh (DSPM) is an experimental, ultra-reliable, fault-tolerant computer communications network that exhibits an organic-like ability to regenerate itself after suffering damage. The regeneration is accomplished by two routines - grow and repair. This paper discusses the DSPM concept for achieving fault tolerance and provides a brief description of the mechanization of both the experiment and the six-node experimental network. The main topic of this paper is the system performance of the growth algorithm contained in the grow routine. The characteristics imbued to DSPM by the growth algorithm are also discussed. Data from an experimental DSPM network and software simulation of larger DSPM-type networks are used to examine the inherent limitation on growth time by the growth algorithm and the relationship of growth time to network size and topology.

  17. Test experience on an ultrareliable computer communication network

    NASA Technical Reports Server (NTRS)

    Abbott, L. W.

    1984-01-01

    The dispersed sensor processing mesh (DSPM) is an experimental, ultrareliable, fault-tolerant computer communications network that exhibits an organic-like ability to regenerate itself after suffering damage. The regeneration is accomplished by two routines - grow and repair. This paper discusses the DSPM concept for achieving fault tolerance and provides a brief description of the mechanization of both the experiment and the six-node experimental network. The main topic of this paper is the system performance of the growth algorithm contained in the grow routine. The characteristics imbued to DSPM by the growth algorithm are also discussed. Data from an experimental DSPM network and software simulation of larger DSPM-type networks are used to examine the inherent limitation on growth time by the growth algorithm and the relationship of growth time to network size and topology.

  18. Quantum computer networks with the orbital angular momentum of light

    NASA Astrophysics Data System (ADS)

    Garcia-Escartin, Juan Carlos; Chamorro-Posada, Pedro

    2012-09-01

    Inside computer networks, different information processing tasks are necessary to deliver the user data efficiently. This processing can also be done in the quantum domain. We present simple optical quantum networks where the orbital angular momentum (OAM) of a single photon is used as an ancillary degree of freedom which controls decisions at the network level. Linear optical elements are enough to provide important network primitives such as multiplexing and routing. First we show how to build a simple multiplexer and demultiplexer which combine photonic qubits and separate them again at the receiver. We also give two different self-routing networks where the OAM of an input photon is enough to make it find its desired destination.

  19. A local area computer network expert system framework

    NASA Technical Reports Server (NTRS)

    Dominy, Robert

    1987-01-01

    Over the past years an expert system called LANES designed to detect and isolate faults in the Goddard-wide Hybrid Local Area Computer Network (LACN) was developed. As a result, the need for developing a more generic LACN fault isolation expert system has become apparent. An object oriented approach was explored to create a set of generic classes, objects, rules, and methods that would be necessary to meet this need. The object classes provide a convenient mechanism for separating high level information from low level network specific information. This approach yeilds a framework which can be applied to different network configurations and be easily expanded to meet new needs.

  20. Computational approach in estimating the need of ditch network maintenance

    NASA Astrophysics Data System (ADS)

    Lauren, Ari; Hökkä, Hannu; Launiainen, Samuli; Palviainen, Marjo; Repo, Tapani; Leena, Finer; Piirainen, Sirpa

    2015-04-01

    Ditch network maintenance (DNM), implemented annually in 70 000 ha area in Finland, is the most controversial of all forest management practices. Nationwide, it is estimated to increase the forest growth by 1…3 million m3 per year, but simultaneously to cause 65 000 tons export of suspended solids and 71 tons of phosphorus (P) to water courses. A systematic approach that allows simultaneous quantification of the positive and negative effects of DNM is required. Excess water in the rooting zone slows the gas exchange and decreases biological activity interfering with the forest growth in boreal forested peatlands. DNM is needed when: 1) the excess water in the rooting zone restricts the forest growth before the DNM, and 2) after the DNM the growth restriction ceases or decreases, and 3) the benefits of DNM are greater than the caused adverse effects. Aeration in the rooting zone can be used as a drainage criterion. Aeration is affected by several factors such as meteorological conditions, tree stand properties, hydraulic properties of peat, ditch depth, and ditch spacing. We developed a 2-dimensional DNM simulator that allows the user to adjust these factors and to evaluate their effect on the soil aeration at different distance from the drainage ditch. DNM simulator computes hydrological processes and soil aeration along a water flowpath between two ditches. Applying daily time step it calculates evapotranspiration, snow accumulation and melt, infiltration, soil water storage, ground water level, soil water content, air-filled porosity and runoff. The model performance in hydrology has been tested against independent high frequency field monitoring data. Soil aeration at different distance from the ditch is computed under steady-state assumption using an empirical oxygen consumption model, simulated air-filled porosity, and diffusion coefficient at different depths in soil. Aeration is adequate and forest growth rate is not limited by poor aeration if the computed oxygen concentration under the rooting zone is > 0. In other case, the forest growth rate is scaled down with a proportion of the realized oxygen flux and the potential oxygen consumption. The growth limitation coefficient is integrated over the area between the ditches and over the simulation time. The growth limitation approach is being validated against field measured data. Concentration of suspended solids and phosphorus in runoff water are derived from empirical equations. The export load is computed by multiplying the daily concentration with the simulated runoff. The concentration of suspended solids depends on the texture of soil, and the time elapsed from the DNM, and the P concentration depends on the prevailing ground water level. The export loads are integrated over the simulation time. The computational evaluation of the benefits and the adverse effects of DNM allow us to locate DNM activities to suitable sites and to avoid it on other sites. The simulator allows a systematic optimization of DNM activity.

  1. US computer research networks: Current and future

    NASA Technical Reports Server (NTRS)

    Kratochvil, D.; Sood, D.; Verostko, A.

    1989-01-01

    During the last decade, NASA LeRC's Communication Program has conducted a series of telecommunications forecasting studies to project trends and requirements and to identify critical telecommunications technologies that must be developed to meet future requirements. The Government Networks Division of Contel Federal Systems has assisted NASA in these studies, and the current study builds upon these earlier efforts. The current major thrust of the NASA Communications Program is aimed at developing the high risk, advanced, communications satellite and terminal technologies required to significantly increase the capacity of future communications systems. Also, major new technological, economic, and social-political events and trends are now shaping the communications industry of the future. Therefore, a re-examination of future telecommunications needs and requirements is necessary to enable NASA to make management decisions in its Communications Program and to ensure the proper technologies and systems are addressed. This study, through a series of Task Orders, is helping NASA define the likely communication service needs and requirements of the future and thereby ensuring that the most appropriate technology developments are pursued.

  2. Overview of the human brain as a distributed computing network

    SciTech Connect

    Gevins, A.S.

    1983-01-01

    The hierarchically organized human brain is viewed as a prime example of a massively parallel, adaptive information processing and process control system. A brief overview of the human brain is provided for computer architects, in hopes that the principles of massive parallelism, dense connectivity and self-organization of assemblies of processing elements will prove relevant to the design of fifth generation VLSI computing networks. 6 references.

  3. Model for the computer-aided-design of local computer networks

    SciTech Connect

    Peskin, A M; Yuen, K

    1980-07-01

    In recognition of the undisputed trends toward distributed-processing, resource-sharing local computer networks, many computer installations and commercial enterprises are developing architectures and configurations that can serve as foundations for growth along these lines. An important subclass of local networks is the so-called back-end network. It is characterized by block-oriented traffic, data rates in the multi-megabit range, and functional roles featuring direct access to very large mass storages and interconnection of data base processors. To the extent that data set or file access has a direct effect on processing speed, a properly performing back-end network can provide considerable throughput improvement to a computing installation. 4 figures, 2 tables. (RWR)

  4. Performance Evaluation in Network-Based Parallel Computing

    NASA Technical Reports Server (NTRS)

    Dezhgosha, Kamyar

    1996-01-01

    Network-based parallel computing is emerging as a cost-effective alternative for solving many problems which require use of supercomputers or massively parallel computers. The primary objective of this project has been to conduct experimental research on performance evaluation for clustered parallel computing. First, a testbed was established by augmenting our existing SUNSPARCs' network with PVM (Parallel Virtual Machine) which is a software system for linking clusters of machines. Second, a set of three basic applications were selected. The applications consist of a parallel search, a parallel sort, a parallel matrix multiplication. These application programs were implemented in C programming language under PVM. Third, we conducted performance evaluation under various configurations and problem sizes. Alternative parallel computing models and workload allocations for application programs were explored. The performance metric was limited to elapsed time or response time which in the context of parallel computing can be expressed in terms of speedup. The results reveal that the overhead of communication latency between processes in many cases is the restricting factor to performance. That is, coarse-grain parallelism which requires less frequent communication between processes will result in higher performance in network-based computing. Finally, we are in the final stages of installing an Asynchronous Transfer Mode (ATM) switch and four ATM interfaces (each 155 Mbps) which will allow us to extend our study to newer applications, performance metrics, and configurations.

  5. Multiple-server Flexible Blind Quantum Computation in Networks

    NASA Astrophysics Data System (ADS)

    Kong, Xiaoqin; Li, Qin; Wu, Chunhui; Yu, Fang; He, Jinjun; Sun, Zhiyuan

    2016-02-01

    Blind quantum computation (BQC) can allow a client with limited quantum power to delegate his quantum computation to a powerful server and still keep his own data private. In this paper, we present a multiple-server flexible BQC protocol, where a client who only needs the ability of accessing qua ntum channels can delegate the computational task to a number of servers. Especially, the client's quantum computation also can be achieved even when one or more delegated quantum servers break down in networks. In other words, when connections to certain quantum servers are lost, clients can adjust flexibly and delegate their quantum computation to other servers. Obviously it is trivial that the computation will be unsuccessful if all servers are interrupted.

  6. A One-Credit Hands-On Introductory Course in Electrical and Computer Engineering Using a Variety of Topic Modules

    ERIC Educational Resources Information Center

    Pierre, J. W.; Tuffner, F. K.; Anderson, J. R.; Whitman, D. L.; Ula, A. H. M. S.; Kubichek, R. F.; Wright, C. H. G.; Barrett, S. F.; Cupal, J. J.; Hamann, J. C.

    2009-01-01

    This paper describes a one-credit laboratory course for freshmen majoring in electrical and computer engineering (ECE). The course is motivational in nature and exposes the students to a wide range of areas of electrical and computer engineering. The authors believe it is important to give freshmen a broad perspective of what ECE is all about, and…

  7. The Use of a PDP-11/20 Computer in a Non-Calculus General Physics Course.

    ERIC Educational Resources Information Center

    Yu, David U. L.

    Computer-assisted instruction supplements traditional methods in a non-calculus physics course offered at Seattle Pacific College. Thirty-five science majors enrolled in the first quarter and 32 continued in the second term. The hardware for the course consists of a PDP-11/20 computer and eight teletype terminals; additional peripheral equipment…

  8. Design and Development of a Sample "Computer Programming" Course Tool via Story-Based E-Learning Approach

    ERIC Educational Resources Information Center

    Kose, Utku; Koc, Durmus; Yucesoy, Suleyman Anil

    2013-01-01

    This study introduces a story-based e-learning oriented course tool that was designed and developed for using within "computer programming" courses. With this tool, students can easily adapt themselves to the subjects in the context of computer programming principles, thanks to the story-based, interactive processes. By using visually…

  9. A One-Credit Hands-On Introductory Course in Electrical and Computer Engineering Using a Variety of Topic Modules

    ERIC Educational Resources Information Center

    Pierre, J. W.; Tuffner, F. K.; Anderson, J. R.; Whitman, D. L.; Ula, A. H. M. S.; Kubichek, R. F.; Wright, C. H. G.; Barrett, S. F.; Cupal, J. J.; Hamann, J. C.

    2009-01-01

    This paper describes a one-credit laboratory course for freshmen majoring in electrical and computer engineering (ECE). The course is motivational in nature and exposes the students to a wide range of areas of electrical and computer engineering. The authors believe it is important to give freshmen a broad perspective of what ECE is all about, and

  10. Curriculum Reform Research of Computer Network Technology Based on School-Enterprise Cooperation

    NASA Astrophysics Data System (ADS)

    Liu, Peng

    There is growing concern about falling levels of student engagement with school science, as evidenced by studies of student attitudes, and decreasing participation at the post compulsory level. College-enterprise cooperation model is a new model of cultivating application-typed talents in college by cooperating with enterprises. In the paper, we analyze the teaching problems in the course of "Computer Network Technology", propose guidelines with teaching practice. Then we explored the reform ways to enhance students' self-learning ability. Finally, the conclusion is given.

  11. Propagation of computer virus both across the Internet and external computers: A complex-network approach

    NASA Astrophysics Data System (ADS)

    Gan, Chenquan; Yang, Xiaofan; Liu, Wanping; Zhu, Qingyi; Jin, Jian; He, Li

    2014-08-01

    Based on the assumption that external computers (particularly, infected external computers) are connected to the Internet, and by considering the influence of the Internet topology on computer virus spreading, this paper establishes a novel computer virus propagation model with a complex-network approach. This model possesses a unique (viral) equilibrium which is globally attractive. Some numerical simulations are also given to illustrate this result. Further study shows that the computers with higher node degrees are more susceptible to infection than those with lower node degrees. In this regard, some appropriate protective measures are suggested.

  12. Identifying failure in a tree network of a parallel computer

    DOEpatents

    Archer, Charles J.; Pinnow, Kurt W.; Wallenfelt, Brian P.

    2010-08-24

    Methods, parallel computers, and products are provided for identifying failure in a tree network of a parallel computer. The parallel computer includes one or more processing sets including an I/O node and a plurality of compute nodes. For each processing set embodiments include selecting a set of test compute nodes, the test compute nodes being a subset of the compute nodes of the processing set; measuring the performance of the I/O node of the processing set; measuring the performance of the selected set of test compute nodes; calculating a current test value in dependence upon the measured performance of the I/O node of the processing set, the measured performance of the set of test compute nodes, and a predetermined value for I/O node performance; and comparing the current test value with a predetermined tree performance threshold. If the current test value is below the predetermined tree performance threshold, embodiments include selecting another set of test compute nodes. If the current test value is not below the predetermined tree performance threshold, embodiments include selecting from the test compute nodes one or more potential problem nodes and testing individually potential problem nodes and links to potential problem nodes.

  13. Routing, flow control, and fairness in computer networks

    SciTech Connect

    Chan, H.W.

    1986-01-01

    The success of computer networks is based on efficient sharing of resources among users. Routing and flow control were designed to enhance the sharing of common resources and to optimize overall system performance. A key performance criterion in this optimization is fairness i.e., the ability to provide equal satisfaction to all users. The author proposes a measure of fairness based on balance interference among users for wide-area, packet-switched computer network. This measure guarantees that the throughput of the individual user cannot be zero and the actual throughput achieved by a user tends to be proportional to his traffic demand. Assuming input rate flow control, and integrated routing and flow control algorithm is developed to optimize this fairness measure, and yet satisfy an overall average delay constraint. An open network model is used in the optimization. An appropriate algorithm is developed to optimize the same fairness measure and satisfy an overall average network delay constraint using this time window flow control. Closed network model and fixed routing are used in the optimization. The algorithm is computationally very efficient and provides nearly optimal solution.

  14. Recurrent Neural Network for Computing the Drazin Inverse.

    PubMed

    Stanimirović, Predrag S; Zivković, Ivan S; Wei, Yimin

    2015-11-01

    This paper presents a recurrent neural network (RNN) for computing the Drazin inverse of a real matrix in real time. This recurrent neural network (RNN) is composed of n independent parts (subnetworks), where n is the order of the input matrix. These subnetworks can operate concurrently, so parallel and distributed processing can be achieved. In this way, the computational advantages over the existing sequential algorithms can be attained in real-time applications. The RNN defined in this paper is convenient for an implementation in an electronic circuit. The number of neurons in the neural network is the same as the number of elements in the output matrix, which represents the Drazin inverse. The difference between the proposed RNN and the existing ones for the Drazin inverse computation lies in their network architecture and dynamics. The conditions that ensure the stability of the defined RNN as well as its convergence toward the Drazin inverse are considered. In addition, illustrative examples and examples of application to the practical engineering problems are discussed to show the efficacy of the proposed neural network. PMID:25706892

  15. Parallelized reliability estimation of reconfigurable computer networks

    NASA Technical Reports Server (NTRS)

    Nicol, David M.; Das, Subhendu; Palumbo, Dan

    1990-01-01

    A parallelized system, ASSURE, for computing the reliability of embedded avionics flight control systems which are able to reconfigure themselves in the event of failure is described. ASSURE accepts a grammar that describes a reliability semi-Markov state-space. From this it creates a parallel program that simultaneously generates and analyzes the state-space, placing upper and lower bounds on the probability of system failure. ASSURE is implemented on a 32-node Intel iPSC/860, and has achieved high processor efficiencies on real problems. Through a combination of improved algorithms, exploitation of parallelism, and use of an advanced microprocessor architecture, ASSURE has reduced the execution time on substantial problems by a factor of one thousand over previous workstation implementations. Furthermore, ASSURE's parallel execution rate on the iPSC/860 is an order of magnitude faster than its serial execution rate on a Cray-2 supercomputer. While dynamic load balancing is necessary for ASSURE's good performance, it is needed only infrequently; the particular method of load balancing used does not substantially affect performance.

  16. Computer program for network synthesis by frequency response fit

    NASA Technical Reports Server (NTRS)

    Green, S.

    1967-01-01

    Computer program synthesizes a passive network by minimizing the difference in desired and actual frequency response. The program solves for the critical points of the error function /weighted least squares fit between calculated and desired frequency response/ by the multivariable Newton-Raphson method with components constrained to an admissible region.

  17. System/360 Computer Assisted Network Scheduling (CANS) System

    NASA Technical Reports Server (NTRS)

    Brewer, A. C.

    1972-01-01

    Computer assisted scheduling techniques that produce conflict-free and efficient schedules have been developed and implemented to meet needs of the Manned Space Flight Network. CANS system provides effective management of resources in complex scheduling environment. System is automated resource scheduling, controlling, planning, information storage and retrieval tool.

  18. An Analysis of Attitudes toward Computer Networks and Internet Addiction.

    ERIC Educational Resources Information Center

    Tsai, Chin-Chung; Lin, Sunny S. J.

    The purpose of this study was to explore the interplay between young people's attitudes toward computer networks and Internet addiction. After analyzing questionnaire responses of an initial sample of 615 Taiwanese high school students, 78 subjects, viewed as possible Internet addicts, were selected for further explorations. It was found that…

  19. SpecialNet. A National Computer-Based Communications Network.

    ERIC Educational Resources Information Center

    Morin, Alfred J.

    1986-01-01

    "SpecialNet," a computer-based communications network for educators at all administrative levels, has been established and is managed by National Systems Management, Inc. Users can send and receive electronic mail, share information on electronic bulletin boards, participate in electronic conferences, and send reports and other documents to each…

  20. High Performance Computing and Networking for Science--Background Paper.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Office of Technology Assessment.

    The Office of Technology Assessment is conducting an assessment of the effects of new information technologies--including high performance computing, data networking, and mass data archiving--on research and development. This paper offers a view of the issues and their implications for current discussions about Federal supercomputer initiatives…

  1. Automated selection of computed tomography display parameters using neural networks

    NASA Astrophysics Data System (ADS)

    Zhang, Di; Neu, Scott; Valentino, Daniel J.

    2001-07-01

    A collection of artificial neural networks (ANN's) was trained to identify simple anatomical structures in a set of x-ray computed tomography (CT) images. These neural networks learned to associate a point in an image with the anatomical structure containing the point by using the image pixels located on the horizontal and vertical lines that ran through the point. The neural networks were integrated into a computer software tool whose function is to select an index into a list of CT window/level values from the location of the user's mouse cursor. Based upon the anatomical structure selected by the user, the software tool automatically adjusts the image display to optimally view the structure.

  2. Computational Neuropsychiatry – Schizophrenia as a Cognitive Brain Network Disorder

    PubMed Central

    Dauvermann, Maria R.; Whalley, Heather C.; Schmidt, André; Lee, Graham L.; Romaniuk, Liana; Roberts, Neil; Johnstone, Eve C.; Lawrie, Stephen M.; Moorhead, Thomas W. J.

    2014-01-01

    Computational modeling of functional brain networks in fMRI data has advanced the understanding of higher cognitive function. It is hypothesized that functional networks mediating higher cognitive processes are disrupted in people with schizophrenia. In this article, we review studies that applied measures of functional and effective connectivity to fMRI data during cognitive tasks, in particular working memory fMRI studies. We provide a conceptual summary of the main findings in fMRI data and their relationship with neurotransmitter systems, which are known to be altered in individuals with schizophrenia. We consider possible developments in computational neuropsychiatry, which are likely to further our understanding of how key functional networks are altered in schizophrenia. PMID:24723894

  3. Global tree network for computing structures enabling global processing operations

    DOEpatents

    Blumrich; Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Hoenicke, Dirk; Steinmacher-Burow, Burkhard D.; Takken, Todd E.; Vranas, Pavlos M.

    2010-01-19

    A system and method for enabling high-speed, low-latency global tree network communications among processing nodes interconnected according to a tree network structure. The global tree network enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the tree via links to facilitate performance of low-latency global processing operations at nodes of the virtual tree and sub-tree structures. The global operations performed include one or more of: broadcast operations downstream from a root node to leaf nodes of a virtual tree, reduction operations upstream from leaf nodes to the root node in the virtual tree, and point-to-point message passing from any node to the root node. The global tree network is configurable to provide global barrier and interrupt functionality in asynchronous or synchronized manner, and, is physically and logically partitionable.

  4. Computation emerges from adaptive synchronization of networking neurons.

    PubMed

    Zanin, Massimiliano; Del Pozo, Francisco; Boccaletti, Stefano

    2011-01-01

    The activity of networking neurons is largely characterized by the alternation of synchronous and asynchronous spiking sequences. One of the most relevant challenges that scientists are facing today is, then, relating that evidence with the fundamental mechanisms through which the brain computes and processes information, as well as with the arousal (or progress) of a number of neurological illnesses. In other words, the problem is how to associate an organized dynamics of interacting neural assemblies to a computational task. Here we show that computation can be seen as a feature emerging from the collective dynamics of an ensemble of networking neurons, which interact by means of adaptive dynamical connections. Namely, by associating logical states to synchronous neuron's dynamics, we show how the usual Boolean logics can be fully recovered, and a universal Turing machine can be constructed. Furthermore, we show that, besides the static binary gates, a wider class of logical operations can be efficiently constructed as the fundamental computational elements interact within an adaptive network, each operation being represented by a specific motif. Our approach qualitatively differs from the past attempts to encode information and compute with complex systems, where computation was instead the consequence of the application of control loops enforcing a desired state into the specific system's dynamics. Being the result of an emergent process, the computation mechanism here described is not limited to a binary Boolean logic, but it can involve a much larger number of states. As such, our results can enlighten new concepts for the understanding of the real computing processes taking place in the brain. PMID:22073167

  5. Reduction of dynamical biochemical reactions networks in computational biology

    PubMed Central

    Radulescu, O.; Gorban, A. N.; Zinovyev, A.; Noel, V.

    2012-01-01

    Biochemical networks are used in computational biology, to model mechanistic details of systems involved in cell signaling, metabolism, and regulation of gene expression. Parametric and structural uncertainty, as well as combinatorial explosion are strong obstacles against analyzing the dynamics of large models of this type. Multiscaleness, an important property of these networks, can be used to get past some of these obstacles. Networks with many well separated time scales, can be reduced to simpler models, in a way that depends only on the orders of magnitude and not on the exact values of the kinetic parameters. The main idea used for such robust simplifications of networks is the concept of dominance among model elements, allowing hierarchical organization of these elements according to their effects on the network dynamics. This concept finds a natural formulation in tropical geometry. We revisit, in the light of these new ideas, the main approaches to model reduction of reaction networks, such as quasi-steady state (QSS) and quasi-equilibrium approximations (QE), and provide practical recipes for model reduction of linear and non-linear networks. We also discuss the application of model reduction to the problem of parameter identification, via backward pruning machine learning techniques. PMID:22833754

  6. Computer Manipulatives in an Ordinary Differential Equations Course: Development, Implementation, and Assessment

    NASA Astrophysics Data System (ADS)

    Miller, Haynes R.; Upton, Deborah S.

    2008-04-01

    The d'Arbeloff Interactive Mathematics Project or d'AIMP is an initiative that seeks to enhance and ultimately transform the teaching and learning of introductory mathematics at the Massachusetts Institute of Technology. A result of this project is a suite of "mathlets," a carefully developed set of dynamic computer applets for use in the university's ordinary differential equations course. In this paper, we present the rationale for such computer innovations, the philosophy behind their design, as well as a discussion of their careful development and implementation. Survey results are reported which yielded positive student feedback and suggestions for improvement.

  7. Applying DNA computation to intractable problems in social network analysis.

    PubMed

    Chen, Rick C S; Yang, Stephen J H

    2010-09-01

    From ancient times to the present day, social networks have played an important role in the formation of various organizations for a range of social behaviors. As such, social networks inherently describe the complicated relationships between elements around the world. Based on mathematical graph theory, social network analysis (SNA) has been developed in and applied to various fields such as Web 2.0 for Web applications and product developments in industries, etc. However, some definitions of SNA, such as finding a clique, N-clique, N-clan, N-club and K-plex, are NP-complete problems, which are not easily solved via traditional computer architecture. These challenges have restricted the uses of SNA. This paper provides DNA-computing-based approaches with inherently high information density and massive parallelism. Using these approaches, we aim to solve the three primary problems of social networks: N-clique, N-clan, and N-club. Their accuracy and feasible time complexities discussed in the paper will demonstrate that DNA computing can be used to facilitate the development of SNA. PMID:20566337

  8. Analysis of Intrusion Detection and Attack Proliferation in Computer Networks

    NASA Astrophysics Data System (ADS)

    Rangan, Prahalad; Knuth, Kevin H.

    2007-11-01

    One of the popular models to describe computer worm propagation is the Susceptible-Infected (SI) model [1]. This model of worm propagation has been implemented on the simulation toolkit Network Simulator v2 (ns-2) [2]. The ns-2 toolkit has the capability to simulate networks of different topologies. The topology studied in this work, however, is that of a simple star-topology. This work introduces our initial efforts to learn the relevant quantities describing an infection given synthetic data obtained from running the ns-2 worm model. We aim to use Bayesian methods to gain a predictive understanding of how computer infections spread in real world network topologies. This understanding would greatly reinforce dissemination of targeted immunization strategies, which may prevent real-world epidemics. The data consist of reports of infection from a subset of nodes in a large network during an attack. The infection equation obtained from [1] enables us to derive a likelihood function for the infection reports. This prior information can be used in the Bayesian framework to obtain the posterior probabilities for network properties of interest, such as the rate at which nodes contact one another (also referred to as contact rate or scan rate). Our preliminary analyses indicate an effective spread rate of only 1/5th the actual scan rate used for a star-type of topology. This implies that as the population becomes saturated with infected nodes the actual spread rate will become much less than the scan rate used in the simulation.

  9. Computing Tutte polynomials of contact networks in classrooms

    NASA Astrophysics Data System (ADS)

    Hincapié, Doracelly; Ospina, Juan

    2013-05-01

    Objective: The topological complexity of contact networks in classrooms and the potential transmission of an infectious disease were analyzed by sex and age. Methods: The Tutte polynomials, some topological properties and the number of spanning trees were used to algebraically compute the topological complexity. Computations were made with the Maple package GraphTheory. Published data of mutually reported social contacts within a classroom taken from primary school, consisting of children in the age ranges of 4-5, 7-8 and 10-11, were used. Results: The algebraic complexity of the Tutte polynomial and the probability of disease transmission increases with age. The contact networks are not bipartite graphs, gender segregation was observed especially in younger children. Conclusion: Tutte polynomials are tools to understand the topology of the contact networks and to derive numerical indexes of such topologies. It is possible to establish relationships between the Tutte polynomial of a given contact network and the potential transmission of an infectious disease within such network

  10. Smart photonic networks and computer security for image data

    NASA Astrophysics Data System (ADS)

    Campello, Jorge; Gill, John T.; Morf, Martin; Flynn, Michael J.

    1998-02-01

    Work reported here is part of a larger project on 'Smart Photonic Networks and Computer Security for Image Data', studying the interactions of coding and security, switching architecture simulations, and basic technologies. Coding and security: coding methods that are appropriate for data security in data fusion networks were investigated. These networks have several characteristics that distinguish them form other currently employed networks, such as Ethernet LANs or the Internet. The most significant characteristics are very high maximum data rates; predominance of image data; narrowcasting - transmission of data form one source to a designated set of receivers; data fusion - combining related data from several sources; simple sensor nodes with limited buffering. These characteristics affect both the lower level network design and the higher level coding methods.Data security encompasses privacy, integrity, reliability, and availability. Privacy, integrity, and reliability can be provided through encryption and coding for error detection and correction. Availability is primarily a network issue; network nodes must be protected against failure or routed around in the case of failure. One of the more promising techniques is the use of 'secret sharing'. We consider this method as a special case of our new space-time code diversity based algorithms for secure communication. These algorithms enable us to exploit parallelism and scalable multiplexing schemes to build photonic network architectures. A number of very high-speed switching and routing architectures and their relationships with very high performance processor architectures were studied. Indications are that routers for very high speed photonic networks can be designed using the very robust and distributed TCP/IP protocol, if suitable processor architecture support is available.

  11. Identification of aerodynamic coefficients using computational neural networks

    NASA Technical Reports Server (NTRS)

    Linse, Dennis J.; Stengel, Robert F.

    1992-01-01

    Precise, smooth aerodynamic models are required for implementing adaptive, nonlinear control strategies. Accurate representations of aerodynamic coefficients can be generated for the complete flight envelope by combining computational neural network models with an Estimation-Before-Modeling paradigm for on-line training information. A novel method of incorporating first-partial-derivative information is employed to estimate the weights in individual feedforward neural networks for each aerodynamic coefficient. The method is demonstrated by generating a model of the normal force coefficient of a twin-jet transport aircraft from simulated flight data, and promising results are obtained.

  12. Identification of driving network of cellular differentiation from single sample time course gene expression data

    NASA Astrophysics Data System (ADS)

    Chen, Ye; Wolanyk, Nathaniel; Ilker, Tunc; Gao, Shouguo; Wang, Xujing

    Methods developed based on bifurcation theory have demonstrated their potential in driving network identification for complex human diseases, including the work by Chen, et al. Recently bifurcation theory has been successfully applied to model cellular differentiation. However, there one often faces a technical challenge in driving network prediction: time course cellular differentiation study often only contains one sample at each time point, while driving network prediction typically require multiple samples at each time point to infer the variation and interaction structures of candidate genes for the driving network. In this study, we investigate several methods to identify both the critical time point and the driving network through examination of how each time point affects the autocorrelation and phase locking. We apply these methods to a high-throughput sequencing (RNA-Seq) dataset of 42 subsets of thymocytes and mature peripheral T cells at multiple time points during their differentiation (GSE48138 from GEO). We compare the predicted driving genes with known transcription regulators of cellular differentiation. We will discuss the advantages and limitations of our proposed methods, as well as potential further improvements of our methods.

  13. Cellular computational networks--a scalable architecture for learning the dynamics of large networked systems.

    PubMed

    Luitel, Bipul; Venayagamoorthy, Ganesh Kumar

    2014-02-01

    Neural networks for implementing large networked systems such as smart electric power grids consist of multiple inputs and outputs. Many outputs lead to a greater number of parameters to be adapted. Each additional variable increases the dimensionality of the problem and hence learning becomes a challenge. Cellular computational networks (CCNs) are a class of sparsely connected dynamic recurrent networks (DRNs). By proper selection of a set of input elements for each output variable in a given application, a DRN can be modified into a CCN which significantly reduces the complexity of the neural network and allows use of simple training methods for independent learning in each cell thus making it scalable. This article demonstrates this concept of developing a CCN using dimensionality reduction in a DRN for scalability and better performance. The concept has been analytically explained and empirically verified through application. PMID:24300549

  14. Perceptions of teaching and learning automata theory in a college-level computer science course

    NASA Astrophysics Data System (ADS)

    Weidmann, Phoebe Kay

    This dissertation identifies and describes student and instructor perceptions that contribute to effective teaching and learning of Automata Theory in a competitive college-level Computer Science program. Effective teaching is the ability to create an appropriate learning environment in order to provide effective learning. We define effective learning as the ability of a student to meet instructor set learning objectives, demonstrating this by passing the course, while reporting a good learning experience. We conducted our investigation through a detailed qualitative case study of two sections (118 students) of Automata Theory (CS 341) at The University of Texas at Austin taught by Dr. Lily Quilt. Because Automata Theory has a fixed curriculum in the sense that many curricula and textbooks agree on what Automata Theory contains, differences being depth and amount of material to cover in a single course, a case study would allow for generalizable findings. Automata Theory is especially problematic in a Computer Science curriculum since students are not experienced in abstract thinking before taking this course, fail to understand the relevance of the theory, and prefer classes with more concrete activities such as programming. This creates a special challenge for any instructor of Automata Theory as motivation becomes critical for student learning. Through the use of student surveys, instructor interviews, classroom observation, material and course grade analysis we sought to understand what students perceived, what instructors expected of students, and how those perceptions played out in the classroom in terms of structure and instruction. Our goal was to create suggestions that would lead to a better designed course and thus a higher student success rate in Automata Theory. We created a unique theoretical basis, pedagogical positivism, on which to study college-level courses. Pedagogical positivism states that through examining instructor and student perceptions of teaching and learning, improvements to a course are possible. These improvements can eventually develop a "best practice" instructional environment. This view is not possible under a strictly constructivist learning theory as there is no way to teach a group of individuals in a "best" way. Using this theoretical basis, we examined the gathered data from CS 341. (Abstract shortened by UMI.)

  15. Brain Network Evolution after Stroke Based on Computational Experiments

    PubMed Central

    Li, Wei; Huang, Yue; Li, Yapeng; Chen, Xi

    2013-01-01

    Stroke is a frequently-occurring disease threatening the human nervous system. As a serious debilitation affecting a large-scale, hierarchical, and vastly complex electrochemical system, stroke remains relatively misunderstood. Rehabilitation mechanisms and means have suffered from this lack of systematic understanding. Here we propose an evolution model to simulate the dynamic actual evolvement process of functional brain networks computationally in an effort to address current shortcomings in the state of the field. According to simulation results, we conclude that the brain networks of patients following acute stroke were characterized by lower small worldness and lower quantity of long-distance connections compared with the healthy condition. Moreover, distance penalization may be used to describe the general mechanism of brain network evolution in the acute period after stroke. PMID:24376592

  16. Gender Effects of Computer Use in a Conceptual Physics Lab Course

    NASA Astrophysics Data System (ADS)

    Van Domelen, Dave

    2010-11-01

    It's always hard to know what to expect when bringing computers into an educational setting, as things are always changing. Student skills with computers are different today than they were 10 years ago, and 20 years ago almost counts as an alien world. Still, one hopes that some of these changes result in positive trends, such as student attitudes toward the use of computers in the classroom. During the course of the Wandering Interactive Lecture Demonstration Project, we've seen a notable gender gap in some aspects of the previous experience of students, and worried that it might impact their learning. So we administered a number of surveys to see if we were right to be worried.

  17. Validation of a computer based objective structured clinical examination in the assessment of undergraduate dermatology courses.

    PubMed

    Kaliyadan, Feroze; Khan, Abdul Sattar; Kuruvilla, Joel; Feroze, Kaberi

    2014-01-01

    Many teaching centers have now adopted objective structured clinical examination (OSCE) as an assessment method for undergraduate dermatology courses. A modification of the standard OSCE in dermatology is computer based or electronic OSCE (eOSCE). We attempted to validate the use of a computer-based OSCE in dermatology in a group of fifth year medical students. The scores of the students in the computer-based OSCE showed a strong positive correlation with the scores on the clinical presentation (Pearson's co-efficient - 0.923, P value <0.000, significant at the 0.01 level) and a good correlation with overall scores of the student (Pearson's co-efficient - 0.728, P value <0.000, significant at the 0.01 level), indicating that this is a reliable method for assessment in dermatology. Generally, the students' feedback regarding the methods was positive. PMID:24685849

  18. The role of computer networks in remote sensing data analysis

    NASA Technical Reports Server (NTRS)

    Swain, P. H.; Phillips, T. L.; Lindenlaub, J. C.

    1973-01-01

    It has been hypothesized that computer networks can be used to make data processing facilities available to the remote sensing community both quickly and effectively. An experiment to test this hypothesis is being conducted by the Laboratory for Applications of Remote Sensing at Purdue University, with the participation of potential users at several remote sites. Initial indications have been highly favorable, although final evaluation awaits further experience and the accumulation of usage data.

  19. Fault Diagnosis in a Fully Distributed Local Computer Network.

    NASA Astrophysics Data System (ADS)

    Kwag, Hye Keun

    Local computer networks are being installed in diverse application areas. Many of the networks employ a distributed control scheme, which has advantages in performance and reliability over a centralized one. However, distribution of control increases the difficulty in locating faulty hardware elements. Consequently, advantages may not be fully realized unless measures are taken to account for the difficulties of fault diagnosis; yet, not much work has been done in this area. A hardcore is defined as a node or a part of a node which is fault-free and which can diagnose other elements in a system. Faults are diagnosed in most existing distributed local computer networks by assuming that every node, or a part of every node, is a fixed hardcore: a fixed node or a part of a fixed node is always a hardcore. Maintaining such high reliability may not be possible or cost-effective for some systems. A distributed network contains dynamically redundant elements, and it is reasonable to assume that fewer nodes are simultaneously faulty than are fault-free at any point in the life cycle of the network. A diagnostic model is proposed herein which determines bindary evaluation results according to the status of the testing and tested nodes, and which leads the network to dynamically locate a fault-free node (a hardcore). This diagnostic model is, in most cases, simpler to implement and more cost-effective than the fixed hardcore. The selected hardcore can diagnose the other elements and can locate permanent faults. In a hop-by-hop test, the destination node and every intermediate node in a path test the transmitted data. This dissertation presents another method to locate an element with frequent transient faults; it checks data only at the destination, thereby, eliminating the need for a hop-by-hop test.

  20. Computing combinatorial intervention strategies and failure modes in signaling networks.

    PubMed

    Samaga, Regina; Von Kamp, Axel; Klamt, Steffen

    2010-01-01

    The identification of combinatorial intervention strategies and the elucidation of failure modes that may cause aberrant behavior of cellular signaling networks are highly relevant topics in cell biology, medicine, and pharmaceutical industry. We have recently introduced the concept of minimal intervention sets (MISs)--minimal combinations of knock-ins and knock-outs provoking a desired/observed response in certain target nodes--to tackle those problems within a Boolean/logical framework. We first generalize the notion of MISs and then present several techniques for search space reduction facilitating the enumeration of MISs in networks of realistic size. One strategy exploits topological information about network-wide interdependencies between the nodes to discard unfavorable single interventions. A similar technique checks during the algorithm whether all target nodes of an intervention problem can be influenced in appropriate direction (up/down) by the interventions contained in MIS candidates. Another strategy takes lessons from electrical engineering: certain interventions are equivalent with respect to their effect on the target nodes and can therefore be grouped in fault equivalence classes (FECs). FECs resulting from so-called structural equivalence can be easily computed in a preprocessing step, with the advantage that only one representative per class needs to be considered when constructing the MISs in the main algorithm. With intervention problems from realistic networks as benchmarks, we show that these algorithmic improvements may reduce the computation time up to 99%, increasing the applicability of MISs in practice. PMID:20078396

  1. Deep Space Network (DSN), Network Operations Control Center (NOCC) computer-human interfaces

    NASA Technical Reports Server (NTRS)

    Ellman, Alvin; Carlton, Magdi

    1993-01-01

    The Network Operations Control Center (NOCC) of the DSN is responsible for scheduling the resources of DSN, and monitoring all multi-mission spacecraft tracking activities in real-time. Operations performs this job with computer systems at JPL connected to over 100 computers at Goldstone, Australia and Spain. The old computer system became obsolete, and the first version of the new system was installed in 1991. Significant improvements for the computer-human interfaces became the dominant theme for the replacement project. Major issues required innovating problem solving. Among these issues were: How to present several thousand data elements on displays without overloading the operator? What is the best graphical representation of DSN end-to-end data flow? How to operate the system without memorizing mnemonics of hundreds of operator directives? Which computing environment will meet the competing performance requirements? This paper presents the technical challenges, engineering solutions, and results of the NOCC computer-human interface design.

  2. Experimental, analytical and computational investigation of bimodal elastomer networks

    NASA Astrophysics Data System (ADS)

    von Lockette, Paris Robert

    Advances in the synthesis of macromolecular materials have led to the creation of special classes of elastomers called bimodal because of their bimodal distributions of linear starting oligomers. Numerous studies on these materials have documented anomalous increases in ultimate strength and toughness at certain mixture combinations of the constituents but have not yet identified a cause for this behavior. In addition, the ability to predict optimal mixtures still eludes polymer chemists. Constitutive models for the behavior of bimodal materials are also unable to predict material behavior, but instead tend to capture results using complicated curve fitting and iterative schemes. This thesis uncovers topological and micromechanical sources of these enhanced properties using periodic, topological simulations of chain-level network formation and develops a constitutive model of the aggregate bimodal network. Using a topological framework, in conjunction with the eight-chain averaging scheme of Arruda and Boyce, this work develops optical and mechanical constitutive models for bimodal elastomers whose results compare favorably with data in the literature. The resulting bimodal network theory is able to predict material response for a range of bimodal compositions using only two sets of data, a direct improvement over previous models. The micromechanics of elastomeric deformation and chain orientation as described by the eight-chain model are further validated by comparing optical and mechanical data generated during large deformation shear tests on unimodal materials with finite element simulations. In addition, a newly developed optical anisotropy model for the Raman tensor of polymeric materials, generated using an eight-chain unit cell model, is shown to compare favorably with tensile data in the literature. Results generated using NETSIM, a computer program developed in this thesis, have revealed naturally occurring, self-reinforcing topological features associated with experimentally observed increases in ultimate strength and toughness. The ability to predict increases in the populations of these topologies allows for the prediction of optimal bimodal mixtures and the definition of a metric of network optimality. The sol and gel fraction predictions from NETSIM also compare well with results obtained from experimental network synthesis and previous computational simulations. After formation, each molecular chain is assigned a modified entropic force-stretch law and the undeformed network is annealed, clearly illustrating how initial chain length distributions in bimodal materials deviate from the r.m.s. assumption. The results of computational annealing also highlight several structural features that have been observed experimentally in the literature. Results of the computational deformation of simulated, three dimensional networks show enhancements to strain hardening in networks with compositions similar to those which exhibited enhanced toughness in experiments. These enhanced, simulated networks also show increases in the orientation versus stretch response over compositionally similar networks. Orientation response results support previous experimental results. Increased occurrence of the doubled connection topology is found to enhance strain hardening in simulated networks and to be a positive factor in enhanced strain energy seen in experiments. The density of single cyclics, while having a positive correlation in the enhanced strain energy seen in experiments appears to negate the effect of increased populations of doubled connections in simulations.

  3. Effective Participation and Discourse through a Computer Network: Investigating Elementary Students' Computer Supported Interaction.

    ERIC Educational Resources Information Center

    Lipponen, L.; Rahikainen, M.; Hakkarainen, K.; Palonen, T.

    2002-01-01

    This study analyzed how students and teachers of one Finnish elementary class participated in and communicated through the Computer Supported Intentional Learning Environment (CSILE) during 1997-1998. The density of the interaction within class, students' participation rates, students' position in the CSILE mediated network of interaction, and the…

  4. Microwave circuit analysis and design by a massively distributed computing network

    NASA Astrophysics Data System (ADS)

    Vai, Mankuan; Prasad, Sheila

    1995-05-01

    The advances in microelectronic engineering have rendered massively distributed computing networks practical and affordable. This paper describes one application of this distributed computing paradigm to the analysis and design of microwave circuits. A distributed computing network, constructed in the form of a neural network, is developed to automate the operations typically performed on a normalized Smith chart. Examples showing the use of this computing network for impedance matching and stabilizing are provided.

  5. Is It Ethical for Patents to Be Issued for the Computer Algorithms that Affect Course Management Systems for Distance Learning?

    ERIC Educational Resources Information Center

    Moreau, Nancy

    2008-01-01

    This article discusses the impact of patents for computer algorithms in course management systems. Referring to historical documents and court cases, the positive and negative aspects of software patents are presented. The key argument is the accessibility to algorithms comprising a course management software program such as Blackboard. The

  6. Is It Ethical for Patents to Be Issued for the Computer Algorithms that Affect Course Management Systems for Distance Learning?

    ERIC Educational Resources Information Center

    Moreau, Nancy

    2008-01-01

    This article discusses the impact of patents for computer algorithms in course management systems. Referring to historical documents and court cases, the positive and negative aspects of software patents are presented. The key argument is the accessibility to algorithms comprising a course management software program such as Blackboard. The…

  7. A Framework for Measuring Student Learning Gains and Engagement in an Introductory Computing Course: A Preliminary Report of Findings

    ERIC Educational Resources Information Center

    Lim, Billy; Hosack, Bryan; Vogt, Paul

    2012-01-01

    This paper describes a framework for measuring student learning gains and engagement in a Computer Science 1 (CS 1) / Information Systems 1 (IS 1) course. The framework is designed for a CS1/IS1 course as it has been traditionally taught over the years as well as when it is taught using a new pedagogical approach with Web services. It enables the…

  8. Hopfield-neural-network-based stereo disparity through parallel computing

    NASA Astrophysics Data System (ADS)

    Viegas, Daniel P. R.

    2001-03-01

    Stereopsis consists of the recovery of three-dimensional scenes from two-dimensional images. Major steps in stereopsis are pre-processing, establishing correspondences and recovering depth. Stereo correspondence is the weightiest of concern. A tremendously flexible environment exists compounding the problem. Hopfield neural networks particularly offers promise, as it is fully inter-connected, converges to a solution and is recurrent. Parallel computing becomes an absolute ingredient due to the enormity of computation. This paper utilizes the matching primitive of edge pixel features with optimization as the relaxation method and a focus on parallel implementation. The computational structure consists of layers, epilayer lines and separate orientations. Similarity, smoothness, uniqueness and ordering are the matching constraints. Energy minimization incorporates all the constraints by exciting and inhibiting neurons. Results are obtained from a number of real color images of differing complexity. The computational intelligence is displayed in terms of efficiency and speed- up. Efficiency, by way of a matching function covering color images and the incorporation of all the constraints into the neural network. Speed-up is demonstrated in the parallel implementation. Stereo disparity is thus obtained with only a few mismatches and a sharp step-down from an initial duration of forty hours to a mere nine minutes.

  9. The Educational Potential of Computer Networking. Interactive Technology Laboratory Report #16.

    ERIC Educational Resources Information Center

    Riel, Margaret M.

    The educational potential of computer networks will be realized only when educators stop focusing on technical connections and start asking how educational activities that are supported on computer networks can make a significant contribution to education. Computer networks can contribute to accomplishing educational goals in language arts (by…

  10. Report on Computing and Networking in the Space Science Laboratory by the SSL Computer Committee

    NASA Technical Reports Server (NTRS)

    Gallagher, D. L. (Editor)

    1993-01-01

    The Space Science Laboratory (SSL) at Marshall Space Flight Center is a multiprogram facility. Scientific research is conducted in four discipline areas: earth science and applications, solar-terrestrial physics, astrophysics, and microgravity science and applications. Representatives from each of these discipline areas participate in a Laboratory computer requirements committee, which developed this document. The purpose is to establish and discuss Laboratory objectives for computing and networking in support of science. The purpose is also to lay the foundation for a collective, multiprogram approach to providing these services. Special recognition is given to the importance of the national and international efforts of our research communities toward the development of interoperable, network-based computer applications.

  11. Computational Models and Emergent Properties of Respiratory Neural Networks

    PubMed Central

    Lindsey, Bruce G.; Rybak, Ilya A.; Smith, Jeffrey C.

    2012-01-01

    Computational models of the neural control system for breathing in mammals provide a theoretical and computational framework bringing together experimental data obtained from different animal preparations under various experimental conditions. Many of these models were developed in parallel and iteratively with experimental studies and provided predictions guiding new experiments. This data-driven modeling approach has advanced our understanding of respiratory network architecture and neural mechanisms underlying generation of the respiratory rhythm and pattern, including their functional reorganization under different physiological conditions. Models reviewed here vary in neurobiological details and computational complexity and span multiple spatiotemporal scales of respiratory control mechanisms. Recent models describe interacting populations of respiratory neurons spatially distributed within the Bötzinger and pre-Bötzinger complexes and rostral ventrolateral medulla that contain core circuits of the respiratory central pattern generator (CPG). Network interactions within these circuits along with intrinsic rhythmogenic properties of neurons form a hierarchy of multiple rhythm generation mechanisms. The functional expression of these mechanisms is controlled by input drives from other brainstem components, including the retrotrapezoid nucleus and pons, which regulate the dynamic behavior of the core circuitry. The emerging view is that the brainstem respiratory network has rhythmogenic capabilities at multiple levels of circuit organization. This allows flexible, state-dependent expression of different neural pattern-generation mechanisms under various physiological conditions, enabling a wide repertoire of respiratory behaviors. Some models consider control of the respiratory CPG by pulmonary feedback and network reconfiguration during defensive behaviors such as cough. Future directions in modeling of the respiratory CPG are considered. PMID:23687564

  12. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    SciTech Connect

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  13. Interarterial course of the right coronary artery: assessment with cardiac computed tomography and myocardial perfusion imaging.

    PubMed

    Husmann, Lars; Valenta, Ines; Veit-Haibach, Patrick; Alkadhi, Hatem; Largiader, Thomas; Kaufmann, Philipp A

    2008-05-01

    A 50-year-old well-trained cyclist reported increasing brief episodes of chest pain over the last 8 years at maximum exercise during alpine bicycle training. Previous cardiac stress testing on a supine bicycle ergometer revealed nonspecific ST-T abnormalities. In June 2007, the patient was referred for computed tomography coronary angiography, which revealed a coronary anomaly, with the right coronary artery originating from the left coronary sinus and taking an interarterial course between the ascending aorta and the pulmonary trunk. There were no atherosclerotic alterations in the coronary arteries. Subsequent bicycle exercise stress and myocardial perfusion imaging revealed no myocardial perfusion defect. PMID:18431148

  14. Reconfigurable modular computer networks for spacecraft on-board processing

    NASA Technical Reports Server (NTRS)

    Rennels, D. A.

    1978-01-01

    The core electronics subsystems on unmanned spacecraft, which have been sent over the last 20 years to investigate the moon, Mars, Venus, and Mercury, have progressed through an evolution from simple fixed controllers and analog computers in the 1960's to general-purpose digital computers in current designs. This evolution is now moving in the direction of distributed computer networks. Current Voyager spacecraft already use three on-board computers. One is used to store commands and provide overall spacecraft management. Another is used for instrument control and telemetry collection, and the third computer is used for attitude control and scientific instrument pointing. An examination of the control logic in the instruments shows that, for many, it is cost-effective to replace the sequencing logic with a microcomputer. The Unified Data System architecture considered consists of a set of standard microcomputers connected by several redundant buses. A typical self-checking computer module will contain 23 RAMs, two microprocessors, one memory interface, three bus interfaces, and one core building block.

  15. Computer-Aided Design of Photocured Polymer Networks

    NASA Astrophysics Data System (ADS)

    Sarkar, Swarnavo; Lin-Gibson, Sheng; Chiang, Martin

    Light-initiated free radical polymerization is widely used for manufacturing biomaterials, scaffolds for micomolding, and is being developed as a method for fast 3D fabrication. This process has a large set of control parameters in the composition of the photocurable matrix and the photocuring conditions. But a quantitative map between the choice of parameters and the properties of the resultant polymer is currently unavailable. We present a computational approach to simulate the growth of a polymer network using the stochastic differential equations of reactions and diffusion for a photocuring system. This method allows us to sample trajectories of a growing polymer network in silico. Thus, we provide a computational alternative to synthesize and probe a polymer network for properties like the degree of conversion, structure factor, density of states, and viscosity. We present simulation results that agree with the universal features observed in photopolymerization. Our proposed method enables a thorough and systematic search over the entire parameter space to discover interesting combinations for synthesis.

  16. Line-plane broadcasting in a data communications network of a parallel computer

    DOEpatents

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-06-08

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  17. Line-plane broadcasting in a data communications network of a parallel computer

    DOEpatents

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-11-23

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  18. The relationship among self-regulation, internet use, and academic achievement in a computer literacy course

    NASA Astrophysics Data System (ADS)

    YangKim, SungHee

    This research was a correlational study of the relationship among self-regulation, students' nonacademic internet browsing, and academic achievement in an undergraduate computer literacy class. Nonacademic internet browsing during class can be a distraction from student academic studies. There has been little research on the role of self-regulation on nonacademic internet browsing in influencing academic achievement. Undergraduate computer literacy classes were used as samples (n= 39) for measuring these variables. Data were collected during three class periods in two sections of the computer literacy course taught by one instructor. The data consisted of a demographic survey, selected and modified items from the GVU 10th WWW User Survey Questionnaire, selected items of the Motivated Strategies for Learning Questionnaire, and measures of internet use. There were low correlations between self-regulation and academic grades (r= .18, p > .05) and self-regulation and internet use (r= -.14, p > .05). None of the correlations were statistically significant. Also, there was no statistically significant correlation between internet use and academic achievement (r= -.23, p >.05). Self-regulation was highly correlated to self-efficacy (r= .53, p < .05). Total internet access was highly correlated to nonacademic related internet browsing (r= .96, p < .01). Although not statistically significant, the consistent negative correlations between nonacademic internet use with both self-regulation and achievement indicate that the internet may present an attractive distraction to achievement which may be due to lack of self-regulation. The implication of embedded instruction of self-regulation in the computer literacy course was discussed to enhance self-regulated internet use. Further study of interaction of self-regulated internet use and academic achievement is recommended.

  19. World: A multipurpose GPS-network computer package

    NASA Astrophysics Data System (ADS)

    Grafarend, Erik W.; Lindlohr, Wolfgang

    WORLD is a multipurpose package to compute geodetic positions in geometry and gravity space. Here undifferenced GPS carrier beat phase observations are processed in the free network mode, namely by the prototype program called PUMA. Within two alternative model formulations, the classical Gauß-Markov Model and the so-called Mixed Model, simultaneously estimated / predicted parameters are those of type (i) Cartesian ground station coordinates (geodetic positioning), (ii) Cartesian satellite coordinates (orbit determination), (iii) receiver- and satellite-specific bias terms, (iv) initial epoch ambiguities and (v) proportional tropospheric corrections. The Mixed Model parameters appear from linearization as a point of stochastic prior information. Namely the weight matrices of stochastic prior information, e.g. for orbit parameters, is assumed to be known. Estimators of type BLUE and predictors of type inhom BLIP and hom BLUP are used. Chapter four discusses in all detail the real analysis of GPS satellite networks of free type. Most notable are the estimated bias terms α, β, γ, in a twofold classification model. The operability of PUMA is demonstrated by the use of multistation phase observations (Wild-Magnavox WM 101-receivers) in a local Berlin network (six station network). It is documented that in spite of the advanced phase observation modelling an internal relative baseline accuracy (utmost length 30 km) of the order of 3 to 5 ppm is achievable. In addition, the influence of orbital prior information on ground station measures, point position as well as accuracy, is demonstrated.

  20. An efficient network for interconnecting remote monitoring instruments and computers

    SciTech Connect

    Halbig, J.K.; Gainer, K.E.; Klosterbuer, S.F.

    1994-08-01

    Remote monitoring instrumentation must be connected with computers and other instruments. The cost and intrusiveness of installing cables in new and existing plants presents problems for the facility and the International Atomic Energy Agency (IAEA). The authors have tested a network that could accomplish this interconnection using mass-produced commercial components developed for use in industrial applications. Unlike components in the hardware of most networks, the components--manufactured and distributed in North America, Europe, and Asia--lend themselves to small and low-powered applications. The heart of the network is a chip with three microprocessors and proprietary network software contained in Read Only Memory. In addition to all nonuser levels of protocol, the software also contains message authentication capabilities. This chip can be interfaced to a variety of transmission media, for example, RS-485 lines, fiber topic cables, rf waves, and standard ac power lines. The use of power lines as the transmission medium in a facility could significantly reduce cabling costs.

  1. Universal quantum computation with ordered spin-chain networks

    SciTech Connect

    Tserkovnyak, Yaroslav; Loss, Daniel

    2011-09-15

    It is shown that anisotropic spin chains with gapped bulk excitations and magnetically ordered ground states offer a promising platform for quantum computation, which bridges the conventional single-spin-based qubit concept with recently developed topological Majorana-based proposals. We show how to realize the single-qubit Hadamard, phase, and {pi}/8 gates as well as the two-qubit controlled-not (cnot) gate, which together form a fault-tolerant universal set of quantum gates. The gates are implemented by judiciously controlling Ising exchange and magnetic fields along a network of spin chains, with each individual qubit furnished by a spin-chain segment. A subset of single-qubit operations is geometric in nature, relying on control of anisotropy of spin interactions rather than their strength. We contrast topological aspects of the anisotropic spin-chain networks to those of p-wave superconducting wires discussed in the literature.

  2. Symbolic dynamics and computation in model gene networks.

    PubMed

    Edwards, R.; Siegelmann, H. T.; Aziza, K.; Glass, L.

    2001-03-01

    We analyze a class of ordinary differential equations representing a simplified model of a genetic network. In this network, the model genes control the production rates of other genes by a logical function. The dynamics in these equations are represented by a directed graph on an n-dimensional hypercube (n-cube) in which each edge is directed in a unique orientation. The vertices of the n-cube correspond to orthants of state space, and the edges correspond to boundaries between adjacent orthants. The dynamics in these equations can be represented symbolically. Starting from a point on the boundary between neighboring orthants, the equation is integrated until the boundary is crossed for a second time. Each different cycle, corresponding to a different sequence of orthants that are traversed during the integration of the equation always starting on a boundary and ending the first time that same boundary is reached, generates a different letter of the alphabet. A word consists of a sequence of letters corresponding to a possible sequence of orthants that arise from integration of the equation starting and ending on the same boundary. The union of the words defines the language. Letters and words correspond to analytically computable Poincare maps of the equation. This formalism allows us to define bifurcations of chaotic dynamics of the differential equation that correspond to changes in the associated language. Qualitative knowledge about the dynamics found by integrating the equation can be used to help solve the inverse problem of determining the underlying network generating the dynamics. This work places the study of dynamics in genetic networks in a context comprising both nonlinear dynamics and the theory of computation. (c) 2001 American Institute of Physics. PMID:12779450

  3. Symbolic dynamics and computation in model gene networks

    NASA Astrophysics Data System (ADS)

    Edwards, R.; Siegelmann, H. T.; Aziza, K.; Glass, L.

    2001-03-01

    We analyze a class of ordinary differential equations representing a simplified model of a genetic network. In this network, the model genes control the production rates of other genes by a logical function. The dynamics in these equations are represented by a directed graph on an n-dimensional hypercube (n-cube) in which each edge is directed in a unique orientation. The vertices of the n-cube correspond to orthants of state space, and the edges correspond to boundaries between adjacent orthants. The dynamics in these equations can be represented symbolically. Starting from a point on the boundary between neighboring orthants, the equation is integrated until the boundary is crossed for a second time. Each different cycle, corresponding to a different sequence of orthants that are traversed during the integration of the equation always starting on a boundary and ending the first time that same boundary is reached, generates a different letter of the alphabet. A word consists of a sequence of letters corresponding to a possible sequence of orthants that arise from integration of the equation starting and ending on the same boundary. The union of the words defines the language. Letters and words correspond to analytically computable Poincaré maps of the equation. This formalism allows us to define bifurcations of chaotic dynamics of the differential equation that correspond to changes in the associated language. Qualitative knowledge about the dynamics found by integrating the equation can be used to help solve the inverse problem of determining the underlying network generating the dynamics. This work places the study of dynamics in genetic networks in a context comprising both nonlinear dynamics and the theory of computation.

  4. Neural network computation with DNA strand displacement cascades.

    PubMed

    Qian, Lulu; Winfree, Erik; Bruck, Jehoshua

    2011-07-21

    The impressive capabilities of the mammalian brain--ranging from perception, pattern recognition and memory formation to decision making and motor activity control--have inspired their re-creation in a wide range of artificial intelligence systems for applications such as face recognition, anomaly detection, medical diagnosis and robotic vehicle control. Yet before neuron-based brains evolved, complex biomolecular circuits provided individual cells with the 'intelligent' behaviour required for survival. However, the study of how molecules can 'think' has not produced an equal variety of computational models and applications of artificial chemical systems. Although biomolecular systems have been hypothesized to carry out neural-network-like computations in vivo and the synthesis of artificial chemical analogues has been proposed theoretically, experimental work has so far fallen short of fully implementing even a single neuron. Here, building on the richness of DNA computing and strand displacement circuitry, we show how molecular systems can exhibit autonomous brain-like behaviours. Using a simple DNA gate architecture that allows experimental scale-up of multilayer digital circuits, we systematically transform arbitrary linear threshold circuits (an artificial neural network model) into DNA strand displacement cascades that function as small neural networks. Our approach even allows us to implement a Hopfield associative memory with four fully connected artificial neurons that, after training in silico, remembers four single-stranded DNA patterns and recalls the most similar one when presented with an incomplete pattern. Our results suggest that DNA strand displacement cascades could be used to endow autonomous chemical systems with the capability of recognizing patterns of molecular events, making decisions and responding to the environment. PMID:21776082

  5. A virtual network computer's optical storage virtualization scheme

    NASA Astrophysics Data System (ADS)

    Wang, Jianzong; Hu, Huaixiang; Wan, Jiguang; Wang, Peng

    2008-12-01

    In this paper, we present the architecture and implementation of a virtual network computers' (VNC) optical storage virtualization scheme called VOSV. Its task is to manage the mapping of virtual optical storage to physical optical storage, a technique known as optical storage virtualization. The design of VOSV aims at the optical storage resources of different clients and servers that have high read-sharing patterns. VOSV uses several schemes such as a two-level Cache mechanism, a VNC server embedded module and the iSCSI protocols to improve the performance. The results measured on the prototype are encouraging, and indicating that VOSV provides the high I/O performance.

  6. Universal quantum computation with a nonlinear oscillator network

    NASA Astrophysics Data System (ADS)

    Goto, Hayato

    2016-05-01

    We theoretically show that a nonlinear oscillator network with controllable parameters can be used for universal quantum computation. The initialization is achieved by a quantum-mechanical bifurcation based on quantum adiabatic evolution, which yields a Schrödinger cat state. All the elementary quantum gates are also achieved by quantum adiabatic evolution, in which dynamical phases accompanying the adiabatic evolutions are controlled by the system parameters. Numerical simulation results indicate that high gate fidelities can be achieved, where no dissipation is assumed.

  7. Predicting Student Performance in a Computer-Assisted Instruction Communication Center Operator Course in the Marine Corps.

    ERIC Educational Resources Information Center

    Skiles, Stephen C.

    This study investigated the utility of aptitude and learning rates for initial study units as predictors of time-to-mastery in an individualized, mastery-based course taught largely by TICCIT (Time-Shared, Interactive, Computer-Controlled Information Television) computer assisted instruction. A TICCIT student station includes a color television, a…

  8. Pilot Studies of In-Course Assessment for a Revised Medical Curriculum: II. Computer-Based, Individual.

    ERIC Educational Resources Information Center

    Miller, Andrew P.; Haden, Patricia; Schwartz, Peter L.; Loten, Ernest G.

    1997-01-01

    A study investigated a computer-based testing method in an anatomic pathology course within a new, modular, systems-oriented medical curriculum at the University of Otago (New Zealand). Students (n=193) completed five biweekly criterion-referenced, computer-based quizzes incorporating digitized photographs and varied question formats. Results

  9. Pilot Studies of In-Course Assessment for a Revised Medical Curriculum: II. Computer-Based, Individual.

    ERIC Educational Resources Information Center

    Miller, Andrew P.; Haden, Patricia; Schwartz, Peter L.; Loten, Ernest G.

    1997-01-01

    A study investigated a computer-based testing method in an anatomic pathology course within a new, modular, systems-oriented medical curriculum at the University of Otago (New Zealand). Students (n=193) completed five biweekly criterion-referenced, computer-based quizzes incorporating digitized photographs and varied question formats. Results…

  10. Self-Assessment and Student Improvement in an Introductory Computer Course at the Community College-Level

    ERIC Educational Resources Information Center

    Spicer-Sutton, Jama

    2013-01-01

    The purpose of this study was to determine a student's computer knowledge upon course entry and if there was a difference in college students' improvement scores as measured by the difference in pretest and posttest scores of new or novice users, moderate users, and expert users at the end of a college-level introductory computing class.…

  11. Properties of sparse penalties on inferring gene regulatory networks from time-course gene expression data.

    PubMed

    Liu, Li-Zhi; Wu, Fang-Xiang; Zhang, Wen-Jun

    2015-02-01

    Genes regulate each other and form a gene regulatory network (GRN) to realise biological functions. Elucidating GRN from experimental data remains a challenging problem in systems biology. Numerous techniques have been developed and sparse linear regression methods become a promising approach to infer accurate GRNs. However, most linear methods are either based on steady-state gene expression data or their statistical properties are not analysed. Here, two sparse penalties, adaptive least absolute shrinkage and selection operator and smoothly clipped absolute deviation, are proposed to infer GRNs from time-course gene expression data based on an auto-regressive model and their Oracle properties are proved under mild conditions. The effectiveness of those methods is demonstrated by applications to in silico and real biological data. PMID:25569860

  12. Network Monitoring and Fault Detection on the University of Illinois at Urbana-Champaign Campus Computer Network.

    ERIC Educational Resources Information Center

    Sng, Dennis Cheng-Hong

    The University of Illinois at Urbana-Champaign (UIUC) has a large campus computer network serving a community of about 20,000 users. With such a large network, it is inevitable that there are a wide variety of technologies co-existing in a multi-vendor environment. Effective network monitoring tools can help monitor traffic and link usage, as well…

  13. Computational methods and opportunities for phosphorylation network medicine

    PubMed Central

    Chen, Yian Ann; Eschrich, Steven A.

    2014-01-01

    Protein phosphorylation, one of the most ubiquitous post-translational modifications (PTM) of proteins, is known to play an essential role in cell signaling and regulation. With the increasing understanding of the complexity and redundancy of cell signaling, there is a growing recognition that targeting the entire network or system could be a necessary and advantageous strategy for treating cancer. Protein kinases, the proteins that add a phosphate group to the substrate proteins during phosphorylation events, have become one of the largest groups of ‘druggable’ targets in cancer therapeutics in recent years. Kinase inhibitors are being regularly used in clinics for cancer treatment. This therapeutic paradigm shift in cancer research is partly due to the generation and availability of high-dimensional proteomics data. Generation of this data, in turn, is enabled by increased use of mass-spectrometry (MS)-based or other high-throughput proteomics platforms as well as companion public databases and computational tools. This review briefly summarizes the current state and progress on phosphoproteomics identification, quantification, and platform related characteristics. We review existing database resources, computational tools, methods for phosphorylation network inference, and ultimately demonstrate the connection to therapeutics. Finally, many research opportunities exist for bioinformaticians or biostatisticians based on developments and limitations of the current and emerging technologies. PMID:25530950

  14. Applied and computational harmonic analysis on graphs and networks

    NASA Astrophysics Data System (ADS)

    Irion, Jeff; Saito, Naoki

    2015-09-01

    In recent years, the advent of new sensor technologies and social network infrastructure has provided huge opportunities and challenges for analyzing data recorded on such networks. In the case of data on regular lattices, computational harmonic analysis tools such as the Fourier and wavelet transforms have well-developed theories and proven track records of success. It is therefore quite important to extend such tools from the classical setting of regular lattices to the more general setting of graphs and networks. In this article, we first review basics of graph Laplacian matrices, whose eigenpairs are often interpreted as the frequencies and the Fourier basis vectors on a given graph. We point out, however, that such an interpretation is misleading unless the underlying graph is either an unweighted path or cycle. We then discuss our recent effort of constructing multiscale basis dictionaries on a graph, including the Hierarchical Graph Laplacian Eigenbasis Dictionary and the Generalized Haar-Walsh Wavelet Packet Dictionary, which are viewed as generalizations of the classical hierarchical block DCTs and the Haar-Walsh wavelet packets, respectively, to the graph setting. Finally, we demonstrate the usefulness of our dictionaries by using them to simultaneously segment and denoise 1-D noisy signals sampled on regular lattices, a problem where classical tools have difficulty.

  15. Security of social network credentials for accessing course portal: Users' experience

    NASA Astrophysics Data System (ADS)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  16. Brain without mind: Computer simulation of neural networks with modifiable neuronal interactions

    NASA Astrophysics Data System (ADS)

    Clark, John W.; Rafelski, Johann; Winston, Jeffrey V.

    1985-07-01

    Aspects of brain function are examined in terms of a nonlinear dynamical system of highly interconnected neuron-like binary decision elements. The model neurons operate synchronously in discrete time, according to deterministic or probabilistic equations of motion. Plasticity of the nervous system, which underlies such cognitive collective phenomena as adaptive development, learning, and memory, is represented by temporal modification of interneuronal connection strengths depending on momentary or recent neural activity. A formal basis is presented for the construction of local plasticity algorithms, or connection-modification routines, spanning a large class. To build an intuitive understanding of the behavior of discrete-time network models, extensive computer simulations have been carried out (a) for nets with fixed, quasirandom connectivity and (b) for nets with connections that evolve under one or another choice of plasticity algorithm. From the former experiments, insights are gained concerning the spontaneous emergence of order in the form of cyclic modes of neuronal activity. In the course of the latter experiments, a simple plasticity routine (“brainwashing,” or “anti-learning”) was identified which, applied to nets with initially quasirandom connectivity, creates model networks which provide more felicitous starting points for computer experiments on the engramming of content-addressable memories and on learning more generally. The potential relevance of this algorithm to developmental neurobiology and to sleep states is discussed. The model considered is at the same time a synthesis of earlier synchronous neural-network models and an elaboration upon them; accordingly, the present article offers both a focused review of the dynamical properties of such systems and a selection of new findings derived from computer simulation.

  17. Teachers, Computer Networks, and the Internet at TechCity High.

    ERIC Educational Resources Information Center

    Robins, Jenny

    Where other educational technologies like television, the VCR and the stand-alone computer have failed to have much of an impact in public schools, local school networks and the Internet have been succeeding. As of 1997, 89% of America's high schools were connected to a computer network. This paper presents a view of network technology from the…

  18. Teaching Advanced Concepts in Computer Networks: VNUML-UM Virtualization Tool

    ERIC Educational Resources Information Center

    Ruiz-Martinez, A.; Pereniguez-Garcia, F.; Marin-Lopez, R.; Ruiz-Martinez, P. M.; Skarmeta-Gomez, A. F.

    2013-01-01

    In the teaching of computer networks the main problem that arises is the high price and limited number of network devices the students can work with in the laboratories. Nowadays, with virtualization we can overcome this limitation. In this paper, we present a methodology that allows students to learn advanced computer network concepts through…

  19. Spiral and Project-Based Learning with Peer Assessment in a Computer Science Project Management Course

    NASA Astrophysics Data System (ADS)

    Jaime, Arturo; Blanco, José Miguel; Domínguez, César; Sánchez, Ana; Heras, Jónathan; Usandizaga, Imanol

    2016-02-01

    Different learning methods such as project-based learning, spiral learning and peer assessment have been implemented in science disciplines with different outcomes. This paper presents a proposal for a project management course in the context of a computer science degree. Our proposal combines three well-known methods: project-based learning, spiral learning and peer assessment. Namely, the course is articulated during a semester through the structured (progressive and incremental) development of a sequence of four projects, whose duration, scope and difficulty of management increase as the student gains theoretical and instrumental knowledge related to planning, monitoring and controlling projects. Moreover, the proposal is complemented using peer assessment. The proposal has already been implemented and validated for the last 3 years in two different universities. In the first year, project-based learning and spiral learning methods were combined. Such a combination was also employed in the other 2 years; but additionally, students had the opportunity to assess projects developed by university partners and by students of the other university. A total of 154 students have participated in the study. We obtain a gain in the quality of the subsequently projects derived from the spiral project-based learning. Moreover, this gain is significantly bigger when peer assessment is introduced. In addition, high-performance students take advantage of peer assessment from the first moment, whereas the improvement in poor-performance students is delayed.

  20. Spiral and Project-Based Learning with Peer Assessment in a Computer Science Project Management Course

    NASA Astrophysics Data System (ADS)

    Jaime, Arturo; Blanco, José Miguel; Domínguez, César; Sánchez, Ana; Heras, Jónathan; Usandizaga, Imanol

    2016-06-01

    Different learning methods such as project-based learning, spiral learning and peer assessment have been implemented in science disciplines with different outcomes. This paper presents a proposal for a project management course in the context of a computer science degree. Our proposal combines three well-known methods: project-based learning, spiral learning and peer assessment. Namely, the course is articulated during a semester through the structured (progressive and incremental) development of a sequence of four projects, whose duration, scope and difficulty of management increase as the student gains theoretical and instrumental knowledge related to planning, monitoring and controlling projects. Moreover, the proposal is complemented using peer assessment. The proposal has already been implemented and validated for the last 3 years in two different universities. In the first year, project-based learning and spiral learning methods were combined. Such a combination was also employed in the other 2 years; but additionally, students had the opportunity to assess projects developed by university partners and by students of the other university. A total of 154 students have participated in the study. We obtain a gain in the quality of the subsequently projects derived from the spiral project-based learning. Moreover, this gain is significantly bigger when peer assessment is introduced. In addition, high-performance students take advantage of peer assessment from the first moment, whereas the improvement in poor-performance students is delayed.

  1. Hazard Communication Project: computer-based training course (for microcomputers). Software

    SciTech Connect

    Fisher, S.

    1989-03-01

    The software is computer-based training with the following course objectives: to inform employees of their employer's requirements under the OSHA Hazard Communication Standard (29 CFR 1910.1200); to instruct employees on the procedures for obtaining and using information on hazardous materials, including understanding labeling systems and understanding the material safety data sheet (MSDS) information; to provide information on 11 classes of chemicals, including their common uses, potential physical and health hazards, detection methods, and safety measures to follow. There are 14 lessons, ranging in length from 30 minutes to 1 (one) hour. Software Description: The software is written in the UNISON language for use on an IBM PC or compatible machines using MS DOS operating system. It requires 378K of memory. Special requirements are an EGA graphics card and monitor. The program will not run on monochrome or CGA systems.

  2. High-performance computing and networking as tools for accurate emission computed tomography reconstruction.

    PubMed

    Passeri, A; Formiconi, A R; De Cristofaro, M T; Pupi, A; Meldolesi, U

    1997-04-01

    It is well known that the quantitative potential of emission computed tomography (ECT) relies on the ability to compensate for resolution, attenuation and scatter effects. Reconstruction algorithms which are able to take these effects into account are highly demanding in terms of computing resources. The reported work aimed to investigate the use of a parallel high-performance computing platform for ECT reconstruction taking into account an accurate model of the acquisition of single-photon emission tomographic (SPET) data. An iterative algorithm with an accurate model of the variable system response was ported on the MIMD (Multiple Instruction Multiple Data) parallel architecture of a 64-node Cray T3D massively parallel computer. The system was organized to make it easily accessible even from low-cost PC-based workstations through standard TCP/IP networking. A complete brain study of 30 (64x64) slices could be reconstructed from a set of 90 (64x64) projections with ten iterations of the conjugate gradients algorithm in 9 s, corresponding to an actual speed-up factor of 135. This work demonstrated the possibility of exploiting remote high-performance computing and networking resources from hospital sites by means of low-cost workstations using standard communication protocols without particular problems for routine use. The achievable speed-up factors allow the assessment of the clinical benefit of advanced reconstruction techniques which require a heavy computational burden for the compensation effects such as variable spatial resolution, scatter and attenuation. The possibility of using the same software on the same hardware platform with data acquired in different laboratories with various kinds of SPET instrumentation is appealing for software quality control and for the evaluation of the clinical impact of the reconstruction methods. PMID:9096089

  3. Internet Web-based Course Delivery: Experiences from Both Sides of the Computer.

    ERIC Educational Resources Information Center

    Hudson, Larry; Kubala, Tom; Paugh, Robert; Truman, Barbara; Bayston, Tom; Ramos, Rafael; Torino, Damian; Kraushaar, David E.; McAdoo, Barbara; Bloethner, Craig

    1997-01-01

    Presents perspectives of teaching and learning via Internet-based courses. The courses discussed use the Web as a delivery system, not as the primary content. Describes courses offered and course organization; instructors' perspectives--from traditional distance education teaching to Web-based teaching; the role of Web consultants; and student…

  4. Students at the University of Abertay Dundee Learn Computer Hacking to Defend Networks

    ERIC Educational Resources Information Center

    Vance, Erik

    2007-01-01

    In this article, the author describes a new cybersecurity course at the University of Abertay Dundee in Scotland. Geoffrey R. Lund, leader of the software-applications program at Abertay, says the course prepares students for a rapidly growing job market by teaching that the best defense is a good offense. Professors set up a network of 20 or so…

  5. Students at the University of Abertay Dundee Learn Computer Hacking to Defend Networks

    ERIC Educational Resources Information Center

    Vance, Erik

    2007-01-01

    In this article, the author describes a new cybersecurity course at the University of Abertay Dundee in Scotland. Geoffrey R. Lund, leader of the software-applications program at Abertay, says the course prepares students for a rapidly growing job market by teaching that the best defense is a good offense. Professors set up a network of 20 or so

  6. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Protection of digital computer and communication systems... computer and communication systems and networks. By November 23, 2009 each licensee currently licensed to... provide high assurance that digital computer and communication systems and networks are...

  7. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Protection of digital computer and communication systems... computer and communication systems and networks. By November 23, 2009 each licensee currently licensed to... provide high assurance that digital computer and communication systems and networks are...

  8. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Protection of digital computer and communication systems... computer and communication systems and networks. By November 23, 2009 each licensee currently licensed to... provide high assurance that digital computer and communication systems and networks are...

  9. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of digital computer and communication systems... computer and communication systems and networks. By November 23, 2009 each licensee currently licensed to... provide high assurance that digital computer and communication systems and networks are...

  10. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Protection of digital computer and communication systems... computer and communication systems and networks. By November 23, 2009 each licensee currently licensed to... provide high assurance that digital computer and communication systems and networks are...

  11. Including Internet insurance as part of a hospital computer network security plan.

    PubMed

    Riccardi, Ken

    2002-01-01

    Cyber attacks on a hospital's computer network is a new crime to be reckoned with. Should your hospital consider internet insurance? The author explains this new phenomenon and presents a risk assessment for determining network vulnerabilities. PMID:11951384

  12. Blogging within a Social Networking Site as a Form of Literature Response in a Teacher Education Course

    ERIC Educational Resources Information Center

    Hutchison, Amy; Wang, Wei

    2012-01-01

    The purpose of this qualitative study was to document how pre-service teachers in a children's literature course experienced blogging on a social networking site as a form of literature response. Understanding how pre-service teachers experience these tools can inform the ways we instruct them to integrate Web 2.0 tools into their teaching.…

  13. The use of wide area computer networks in disaster management and the implications for hospital/medical networks.

    PubMed

    Butler, D L; Anderson, P S

    1992-12-17

    Computer-mediated communication in various forms is already being used in all phases of disaster management--preparation, response, recovery, and long-term mitigation. However, to date wide area computer networks--particularly the Internet (the supernetwork of networks)--have been used only to a limited extent in disaster management and prevention. Some of these applications are described in this paper. Nevertheless, the high speed and ease of information transfer by computer network and the vast resources becoming available on the Internet make it inevitable that the use of computer networks to temper disasters will increase enormously in the next decade. The Internet will provide a key means through which networks initially dedicated to solely medical purposes and the individuals who use them will become involved not only in disaster response and mitigation worldwide, but in the global community and consciousness that is the Internet. PMID:1309091

  14. Prediction of Student Course Selection in Online Higher Education Institutes Using Neural Network

    ERIC Educational Resources Information Center

    Kardan, Ahmad A.; Sadeghi, Hamid; Ghidary, Saeed Shiry; Sani, Mohammad Reza Fani

    2013-01-01

    Students are required to choose courses they are interested in for the coming semester. Due to restrictions, including lack of sufficient resources and overheads of running several courses, some universities might not offer all of a student's desirable courses. Universities must know every student's demands for every course prior to each semester

  15. Prediction of Student Course Selection in Online Higher Education Institutes Using Neural Network

    ERIC Educational Resources Information Center

    Kardan, Ahmad A.; Sadeghi, Hamid; Ghidary, Saeed Shiry; Sani, Mohammad Reza Fani

    2013-01-01

    Students are required to choose courses they are interested in for the coming semester. Due to restrictions, including lack of sufficient resources and overheads of running several courses, some universities might not offer all of a student's desirable courses. Universities must know every student's demands for every course prior to each semester…

  16. Measures of effectiveness for BMD mid-course tracking on MIMD massively parallel computers

    SciTech Connect

    VanDyke, J.P.; Tomkins, J.L.; Furnish, M.D.

    1995-05-01

    The TRC code, a mid-course tracking code for ballistic missiles, has previously been implemented on a 1024-processor MIMD (Multiple Instruction -- Multiple Data) massively parallel computer. Measures of Effectiveness (MOE) for this algorithm have been developed for this computing environment. The MOE code is run in parallel with the TRC code. Particularly useful MOEs include the number of missed objects (real objects for which the TRC algorithm did not construct a track); of ghost tracks (tracks not corresponding to a real object); of redundant tracks (multiple tracks corresponding to a single real object); and of unresolved objects (multiple objects corresponding to a single track). All of these are expressed as a function of time, and tend to maximize during the time in which real objects are spawned (multiple reentry vehicles per post-boost vehicle). As well, it is possible to measure the track-truth separation as a function of time. A set of calculations is presented illustrating these MOEs as a function of time for a case with 99 post-boost vehicles, each of which spawns 9 reentry vehicles.

  17. Efficient computation via sparse coding in electrosensory neural networks

    PubMed Central

    Chacron, Maurice J; Longtin, André; Maler, Leonard

    2015-01-01

    The electric sense combines spatial aspects of vision and touch with temporal features of audition. Its accessible neural architecture shares similarities with mammalian sensory systems and allows for recordings from successive brain areas to test hypotheses about neural coding. Further, electrosensory stimuli encountered during prey capture, navigation, and communication, can be readily synthesized in the laboratory. These features enable analyses of the neural circuitry that reveal general principles of encoding and decoding, such as segregation of information into separate streams and neural response sparsification. A systems level understanding arises via linkage between cellular differentiation and network architecture, revealed by in vitro and in vivo analyses, while computational modeling reveals how single cell dynamics and connectivity shape the sparsification process. PMID:21683574

  18. Construction of a closed polymer network for computer simulations.

    PubMed

    Kamerlin, Natasha; Ekholm, Tobias; Carlsson, Tobias; Elvingson, Christer

    2014-10-21

    Computer simulations are an important tool for linking the behaviour of polymer materials to the properties of the constituent polymer chains. In simulations, one normally uses periodic boundary conditions to mimic a macroscopic system. For a cross-linked polymer network, this will impose restrictions on the motion of the polymer chains at the borders of the simulation cell. We present a new method for constructing a three-dimensional closed network without periodic boundaries by embedding the system onto the surface of a sphere in four dimensions. This method can also be used to construct finite-sized gel particles for simulating the swelling of particles in a surrounding solvent. The method is described in algorithmic detail to allow the incorporation of the method into different types of simulation programs. We also present the results of Brownian dynamics simulations, analyzing the end-to-end distribution, radial distribution function, and the pore size distribution for different volume fractions and for chains with varying stiffness. PMID:25338887

  19. Construction of a closed polymer network for computer simulations

    NASA Astrophysics Data System (ADS)

    Kamerlin, Natasha; Ekholm, Tobias; Carlsson, Tobias; Elvingson, Christer

    2014-10-01

    Computer simulations are an important tool for linking the behaviour of polymer materials to the properties of the constituent polymer chains. In simulations, one normally uses periodic boundary conditions to mimic a macroscopic system. For a cross-linked polymer network, this will impose restrictions on the motion of the polymer chains at the borders of the simulation cell. We present a new method for constructing a three-dimensional closed network without periodic boundaries by embedding the system onto the surface of a sphere in four dimensions. This method can also be used to construct finite-sized gel particles for simulating the swelling of particles in a surrounding solvent. The method is described in algorithmic detail to allow the incorporation of the method into different types of simulation programs. We also present the results of Brownian dynamics simulations, analyzing the end-to-end distribution, radial distribution function, and the pore size distribution for different volume fractions and for chains with varying stiffness.

  20. Inference of gene interaction networks using conserved subsequential patterns from multiple time course gene expression datasets

    PubMed Central

    2015-01-01

    Motivation Deciphering gene interaction networks (GINs) from time-course gene expression (TCGx) data is highly valuable to understand gene behaviors (e.g., activation, inhibition, time-lagged causality) at the system level. Existing methods usually use a global or local proximity measure to infer GINs from a single dataset. As the noise contained in a single data set is hardly self-resolved, the results are sometimes not reliable. Also, these proximity measurements cannot handle the co-existence of the various in vivo positive, negative and time-lagged gene interactions. Methods and results We propose to infer reliable GINs from multiple TCGx datasets using a novel conserved subsequential pattern of gene expression. A subsequential pattern is a maximal subset of genes sharing positive, negative or time-lagged correlations of one expression template on their own subsets of time points. Based on these patterns, a GIN can be built from each of the datasets. It is assumed that reliable gene interactions would be detected repeatedly. We thus use conserved gene pairs from the individual GINs of the multiple TCGx datasets to construct a reliable GIN for a species. We apply our method on six TCGx datasets related to yeast cell cycle, and validate the reliable GINs using protein interaction networks, biopathways and transcription factor-gene regulations. We also compare the reliable GINs with those GINs reconstructed by a global proximity measure Pearson correlation coefficient method from single datasets. It has been demonstrated that our reliable GINs achieve much better prediction performance especially with much higher precision. The functional enrichment analysis also suggests that gene sets in a reliable GIN are more functionally significant. Our method is especially useful to decipher GINs from multiple TCGx datasets related to less studied organisms where little knowledge is available except gene expression data. PMID:26681650

  1. Development of a Graduate Course in Computer-Aided Geometric Design.

    ERIC Educational Resources Information Center

    Ault, Holly K.

    1991-01-01

    Described is a course that focuses on theory and techniques for ideation and refinement of geometric models used in mechanical engineering design applications. The course objectives, course outline, a description of the facilities, sample exercises, and a discussion of final projects are included. (KR)

  2. Comparison of Self-Perceptions of Computer Literacy and Skills Proficiency Assessment of College Students in Entry Level Technology Courses

    ERIC Educational Resources Information Center

    Cammack, Nancy

    2008-01-01

    This study was designed to compare perceived computer literacy with skills proficiency assessment of given skill sets with a second purpose to investigate the impact of certain variables on perceptions and skills proficiency of students enrolled in an introductory college level technology course. Implementation of survey research and hands-on…

  3. Use of a New "Moodle" Module for Improving the Teaching of a Basic Course on Computer Architecture

    ERIC Educational Resources Information Center

    Trenas, M. A.; Ramos, J.; Gutierrez, E. D.; Romero, S.; Corbera, F.

    2011-01-01

    This paper describes how a new "Moodle" module, called "CTPracticals", is applied to the teaching of the practical content of a basic computer organization course. In the core of the module, an automatic verification engine enables it to process the VHDL designs automatically as they are submitted. Moreover, a straightforward modification of this…

  4. A Computer-Assisted Instruction Course on Laboratory Detection of Malarial Parasites in Human Blood. Interim Report.

    ERIC Educational Resources Information Center

    Mitzel, Harold E.

    In cooperation with the United States Navy, this project was undertaken to examine the feasibility of computer assisted instruction in clinical malaria recognition, to train a small group of Naval personnel in techniques of creating and presenting such material, and to evaluate the course by giving it to a representative sample of Naval medical

  5. Problem-Based Learning Environment in Basic Computer Course: Pre-Service Teachers' Achievement and Key Factors for Learning

    ERIC Educational Resources Information Center

    Efendioglu, Akin

    2015-01-01

    This experimental study aims to determine pre-service teachers' achievements and key factors that affect the learning process with regard to problem-based learning (PBL) and lecture-based computer course (LBCC) conditions. The research results showed that the pre-service teachers in the PBL group had significantly higher achievement scores than…

  6. The Effects of Cooperative and Individualistic Learning Structures on Achievement in a College-Level Computer-Aided Drafting Course

    ERIC Educational Resources Information Center

    Swab, A. Geoffrey

    2012-01-01

    This study of cooperative learning in post-secondary engineering education investigated achievement of engineering students enrolled in two intact sections of a computer-aided drafting (CAD) course. Quasi-experimental and qualitative methods were employed in comparing student achievement resulting from out-of-class cooperative and individualistic…

  7. Computer-Mediated Word-of-Mouth Communication: The Influence of Mixed Reviews on Student Perceptions of Instructors and Courses

    ERIC Educational Resources Information Center

    Edwards, Autumn; Edwards, Chad

    2013-01-01

    The purpose of this experiment was to test the influence of mixed reviews appearing as computer-mediated word-of-mouth communication (WOM) on student perceptions of instructors (attractiveness and credibility) and attitudes toward learning course content (affective learning and state motivation). Using the heuristic-systematic processing model, it…

  8. Computer-Mediated Word-of-Mouth Communication: The Influence of Mixed Reviews on Student Perceptions of Instructors and Courses

    ERIC Educational Resources Information Center

    Edwards, Autumn; Edwards, Chad

    2013-01-01

    The purpose of this experiment was to test the influence of mixed reviews appearing as computer-mediated word-of-mouth communication (WOM) on student perceptions of instructors (attractiveness and credibility) and attitudes toward learning course content (affective learning and state motivation). Using the heuristic-systematic processing model, it

  9. Applying Web-Based Co-Regulated Learning to Develop Students' Learning and Involvement in a Blended Computing Course

    ERIC Educational Resources Information Center

    Tsai, Chia-Wen

    2015-01-01

    This research investigated, via quasi-experiments, the effects of web-based co-regulated learning (CRL) on developing students' computing skills. Two classes of 68 undergraduates in a one-semester course titled "Applied Information Technology: Data Processing" were chosen for this research. The first class (CRL group, n = 38) received…

  10. Development, Implementation, and Cost-Assessment of an Integrated Computer-Assisted Instruction Course on Drug Interactions.

    ERIC Educational Resources Information Center

    Narducci, Warren A.

    1985-01-01

    A study of the feasibility of using integrated, computer-assisted instruction in a drug interaction course revealed that despite the high initial time and financial investment, the potential educational benefits and high student acceptance of the instruction supports its application in other curriculum areas. (MSE)

  11. Exploring Students Intentions to Study Computer Science and Identifying the Differences among ICT and Programming Based Courses

    ERIC Educational Resources Information Center

    Giannakos, Michail N.

    2014-01-01

    Computer Science (CS) courses comprise both Programming and Information and Communication Technology (ICT) issues; however these two areas have substantial differences, inter alia the attitudes and beliefs of the students regarding the intended learning content. In this research, factors from the Social Cognitive Theory and Unified Theory of…

  12. Implementation of Service Learning and Civic Engagement for Computer Information Systems Students through a Course Project at the Hashemite University

    ERIC Educational Resources Information Center

    Al-Khasawneh, Ahmad; Hammad, Bashar K.

    2013-01-01

    Service learning methodologies provide information systems students with the opportunity to create and implement systems in real-world, public service-oriented social contexts. This paper presents a case study of integrating a service learning project into an undergraduate Computer Information Systems course titled "Information Systems"…

  13. A Computer-Assisted Instruction Course on Laboratory Detection of Malarial Parasites in Human Blood. Interim Report.

    ERIC Educational Resources Information Center

    Mitzel, Harold E.

    In cooperation with the United States Navy, this project was undertaken to examine the feasibility of computer assisted instruction in clinical malaria recognition, to train a small group of Naval personnel in techniques of creating and presenting such material, and to evaluate the course by giving it to a representative sample of Naval medical…

  14. Effects of Computer Assisted Instruction on Students' Attitudes towards Science Courses in Turkey: A Meta-Analysis

    ERIC Educational Resources Information Center

    Tekbiyik, Ahmet; Birinci Konur, Kader; Pirasa, Nimet

    2008-01-01

    Many primary studies have been performed to reveal the effects of computer assisted instruction (CAI) on students' attitudes towards science courses. In determining the effectiveness of these studies, gathering and evaluating of the studies at some characteristics play an important role. The aim of this study is to determine meta-analytically the…

  15. Effects of Computer-Aided Personalized System of Instruction in Developing Knowledge and Critical Thinking in Blended Learning Courses

    ERIC Educational Resources Information Center

    Svenningsen, Louis; Pear, Joseph J.

    2011-01-01

    Two experiments were conducted to assess an online version of Keller's personalized system of instruction, called computer-aided personalized system of instruction (CAPSI), as part of a blended learning design with regard to course knowledge and critical thinking development. In Experiment 1, two lecture sections of an introduction to University…

  16. Applying Web-Based Co-Regulated Learning to Develop Students' Learning and Involvement in a Blended Computing Course

    ERIC Educational Resources Information Center

    Tsai, Chia-Wen

    2015-01-01

    This research investigated, via quasi-experiments, the effects of web-based co-regulated learning (CRL) on developing students' computing skills. Two classes of 68 undergraduates in a one-semester course titled "Applied Information Technology: Data Processing" were chosen for this research. The first class (CRL group, n = 38) received

  17. Reflective Behaviors under a Web-Based Portfolio Assessment Environment for High School Students in a Computer Course

    ERIC Educational Resources Information Center

    Chang, Chi-Cheng; Chen, Cheng-Chuan; Chen, Yi-Hui

    2012-01-01

    This research attempted to categorize reflection in a Web-based portfolio assessment using the Chinese Word Segmenting System (CWSS). Another aim of this research was to explore reflective performance in which individual differences were further examined. Participants were 45 eight-grade students from a junior high school taking a computer course.…

  18. The Effect of Interactive e-Book on Students' Achievement at Najran University in Computer in Education Course

    ERIC Educational Resources Information Center

    Ebied, Mohammed Mohammed Ahmed; Rahman, Shimaa Ahmed Abdul

    2015-01-01

    The current study aims to examine the effect of interactive e-books on students' achievement at Najran University in computer in education course. Quasi-experimental study design is used in the study and to collect data the researchers built achievement test to measure the dependent variable represented in the achievement affected by experimental…

  19. Promoting CLT within a Computer Assisted Learning Environment: A Survey of the Communicative English Course of FLTC

    ERIC Educational Resources Information Center

    Haider, Md. Zulfeqar; Chowdhury, Takad Ahmed

    2012-01-01

    This study is based on a survey of the Communicative English Language Certificate (CELC) course run by the Foreign Language Training Center (FLTC), a Project under the Ministry of Education, Bangladesh. FLTC is working to promote the teaching and learning of English through its eleven computer-based and state of the art language laboratories. As…

  20. The Effects of Cooperative and Individualistic Learning Structures on Achievement in a College-Level Computer-Aided Drafting Course

    ERIC Educational Resources Information Center

    Swab, A. Geoffrey

    2012-01-01

    This study of cooperative learning in post-secondary engineering education investigated achievement of engineering students enrolled in two intact sections of a computer-aided drafting (CAD) course. Quasi-experimental and qualitative methods were employed in comparing student achievement resulting from out-of-class cooperative and individualistic