1,557 research outputs found

    KIKS Creativity and Technology for All

    Get PDF
    To help meet an educational and societal requirement for all students to enjoy, have confidence and ability in creativity and technology, the ?Kids Inspiring Kids in STEAM? (KIKS) EU project adopted an intensive Hothousing process challenging students in Finland, Spain, Hungary and the United Kingdom to engage in collaborative problem solving to develop solutions to: ?How would you get your schoolmates to LOVE STEAM?? The project provided a process and technology toolkit for students, including those with special educational needs, to achieve their solutions. A completion rate of 90% suggested that all schools and students could cope with and enjoy the process and associated technology toolkit, which featured social media plus Micro:bit, Tracker and GeoGebra for data collection and modelling. We have extended the toolkit with simulation software and a graphical programming environment to produce realistic animations of objects in motion. Thus students will have a creativity and technology toolkit to experience the kinds of techniques and skills used by software engineers in the video, games and special effects industries. The toolkit will be on the GeoGebra platform which, in addition to mathematics, embraces STEAM and social media

    Plagiarism Deterrence in CS1 Through Keystroke Data

    Get PDF
    Recent work in computing education has explored the idea of analyzing and grading using the process of writing a computer program rather than just the final submitted code. We build on this idea by investigating the effect on plagiarism when the process of coding, in the form of keystroke logs, is submitted for grading in addition to the final code. We report results from two terms of a university CS1 course in which students submitted keystroke logs. We find that when students are required to submit a log of keystrokes together with their written code they are less likely to plagiarize. In this paper we explore issues of implementation, adoption, deterrence, anxiety, and privacy. Our keystroke logging software is available in the form of an IDE plugin in a public plugin repository

    Data analytics 2016: proceedings of the fifth international conference on data analytics

    Get PDF

    Categorization of Security Design Patterns

    Get PDF
    Strategies for software development often slight security-related considerations, due to the difficulty of developing realizable requirements, identifying and applying appropriate techniques, and teaching secure design. This work describes a three-part strategy for addressing these concerns. Part 1 provides detailed questions, derived from a two-level characterization of system security based on work by Chung et. al., to elicit precise requirements. Part 2 uses a novel framework for relating this characterization to previously published strategies, or patterns, for secure software development. Included case studies suggest the framework\u27s effectiveness, involving the application of three patterns for secure design (Limited View, Role-Based Access Control, Secure State Machine) to a production system for document management. Part 3 presents teaching modules to introduce patterns into lower-division computer science courses. Five modules, integer over ow, input validation, HTTPS, les access, and SQL injection, are proposed for conveying an aware of security patterns and their value in software development

    Advancement of A Lab-Scale Anaerobic Biodigester to Implement Monitoring and Sensing Technologies: A Promising Educational Instrument for Reducing Carbon Emissions and Combating Climate Change

    Get PDF
    This study showcases a laboratory-scale anaerobic biodigester designed to introduce monitoring and sensing methods for tracking microorganism growth based on various parameters, including redox potential, pH, pressure, and temperature, measured in a near-continuous manner. A microcontroller system (Atmega328—Arduino) was employed for this purpose. The design's foundation lies in flexible and open-source software, hardware, and firmware (Scilab, Arduino, Processing), making it easily adaptable for other relevant research. The biodigester was developed as an educational tool for engineering students to gain a deeper understanding of its operation and to track the system's properties and progression over time. This enables the creation of property curves, which can be correlated for a more comprehensive understanding of biodigester functionality. The study specifically explored the connection between the oxidation-reduction reaction and microbial activity, demonstrating that redox potential can effectively measure microorganism growth in an anaerobic environment. Ultimately, this laboratory-scale biodigester serves as an introduction to the technology typically utilised for controlling carbon footprints, particularly in the wastewater sector, and consequently contributes to climate change mitigation efforts. Keywords: wastewater; low-carbon; biodigester; laboratory scale; open-source tools DOI: 10.7176/JNSR/14-8-04 Publication date:May 31st 202

    Beaver Creek restorative design using engineering in nature

    Get PDF
    Stream restoration work can be instrumental for the wellbeing of an ecosystem. Located in the Shenandoah Valley in Virginia is Beaver Creek, a well-known spot for fly-fishing due to its pristine water conditions and open surroundings. In order to maintain these conditions, a 100-foot stretch of Beaver Creek needed to be restored to prevent further erosion, stabilize the banks, and enhance the natural habitats. The project involved excavating a sediment island, filling in an eroded bank, building a cross vane, and adding stakes. Local stakeholders came together to complete this project contributing their expertise, equipment, and time. The construction was successfully completed in April 2020 and this site will continue to be monitored until around 2023. The work done at Beaver Creek looks natural and the stream is responding wonderfully to the changes

    The Alumnus, 1965-03

    Get PDF
    https://soundideas.pugetsound.edu/thealumnus_all/1059/thumbnail.jp

    Pervasive computing reference architecture from a software engineering perspective (PervCompRA-SE)

    Get PDF
    Pervasive computing (PervComp) is one of the most challenging research topics nowadays. Its complexity exceeds the outdated main frame and client-server computation models. Its systems are highly volatile, mobile, and resource-limited ones that stream a lot of data from different sensors. In spite of these challenges, it entails, by default, a lengthy list of desired quality features like context sensitivity, adaptable behavior, concurrency, service omnipresence, and invisibility. Fortunately, the device manufacturers improved the enabling technology, such as sensors, network bandwidth, and batteries to pave the road for pervasive systems with high capabilities. On the other hand, this domain area has gained an enormous amount of attention from researchers ever since it was first introduced in the early 90s of the last century. Yet, they are still classified as visionary systems that are expected to be woven into people’s daily lives. At present, PervComp systems still have no unified architecture, have limited scope of context-sensitivity and adaptability, and many essential quality features are insufficiently addressed in PervComp architectures. The reference architecture (RA) that we called (PervCompRA-SE) in this research, provides solutions for these problems by providing a comprehensive and innovative pair of business and technical architectural reference models. Both models were based on deep analytical activities and were evaluated using different qualitative and quantitative methods. In this thesis we surveyed a wide range of research projects in PervComp in various subdomain areas to specify our methodological approach and identify the quality features in the PervComp domain that are most commonly found in these areas. It presented a novice approach that utilizes theories from sociology, psychology, and process engineering. The thesis analyzed the business and architectural problems in two separate chapters covering the business reference architecture (BRA) and the technical reference architecture (TRA). The solutions for these problems were introduced also in the BRA and TRA chapters. We devised an associated comprehensive ontology with semantic meanings and measurement scales. Both the BRA and TRA were validated throughout the course of research work and evaluated as whole using traceability, benchmark, survey, and simulation methods. The thesis introduces a new reference architecture in the PervComp domain which was developed using a novel requirements engineering method. It also introduces a novel statistical method for tradeoff analysis and conflict resolution between the requirements. The adaptation of the activity theory, human perception theory and process re-engineering methods to develop the BRA and the TRA proved to be very successful. Our approach to reuse the ontological dictionary to monitor the system performance was also innovative. Finally, the thesis evaluation methods represent a role model for researchers on how to use both qualitative and quantitative methods to evaluate a reference architecture. Our results show that the requirements engineering process along with the trade-off analysis were very important to deliver the PervCompRA-SE. We discovered that the invisibility feature, which was one of the envisioned quality features for the PervComp, is demolished and that the qualitative evaluation methods were just as important as the quantitative evaluation methods in order to recognize the overall quality of the RA by machines as well as by human beings

    Scalable and Energy Efficient Software Architecture for Human Behavioral Measurements

    Get PDF
    Understanding human behavior is central to many professions including engineering, health and the social sciences, and has typically been measured through surveys, direct observation and interviews. However, these methods are known to have drawbacks, including bias, problems with recall accuracy, and low temporal fidelity. Modern mobile phones have a variety of sensors that can be used to find activity patterns and infer the underlying human behaviors, placing a heavy load on the phone's battery. Social science researchers hoping to leverage this new technology must carefully balance the fidelity of the data with the cost in phone performance. Crucially, many of the data collected are of limited utility because they are redundant or unnecessary for a particular study question. Previous researchers have attempted to address this problem by modifying the measurement schedule based on sensed context, but a complete solution remains elusive. In the approach described here, measurement is made contingent on sensed context and measurement objectives through extensions to a configuration language, allowing significant improvement to flexibility and reliability. Empirical studies indicate a significant improvement in energy efficiency with acceptable losses in data fidelity
    • …
    corecore