{"title":"An Optimization of Computational Resources Allocation for Multi-MEC and Cloud Networks","authors":"A. Y. Du","doi":"10.1109/ISEC49744.2020.9397859","DOIUrl":"https://doi.org/10.1109/ISEC49744.2020.9397859","url":null,"abstract":"Mobile edge computing (MEC) technology has been studied for several years [1] and is still attracting more attentions. The optimization of MEC with cloud computing targets on improving efficiency of resources. In this work we consider a practical MEC application case in mobile video surveillance and analytics. By investigating some real application systems and using a simple model to analyze an optimization issue, we obtained some numerical results using MATLAB. The results shows that it is possible to improve the system performance in terms of energy saving and efficiency improving by balancing the workload between MEC and the cloud.","PeriodicalId":355861,"journal":{"name":"2020 IEEE Integrated STEM Education Conference (ISEC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122442334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systems Thinking and STEM/Technical Training: How to use a Holistic View to Prevent End-to-End System Problems","authors":"Dwight Bues","doi":"10.1109/ISEC49744.2020.9397827","DOIUrl":"https://doi.org/10.1109/ISEC49744.2020.9397827","url":null,"abstract":"I was challenged by Rocky Avvento and Eric Sudano at the 2019 IEEE ISEC conference to expand their discussion of Systems Thinking (targeting K-12 students) and mine regarding STEM Education to cover how these holistic design methodologies apply to Vocational - Technical Training. A holistic design process is utilized by engineers subconsciously, but is one of the most important things to teach to young technical students. This paper will present several operationally-relevant models of “systems” to help the reader understand the concept and, potentially, use it in his/her own designs. The Challenge is that there must be a way of looking at Systems that gives the Engineer/Technician a broad view of its overall working constraints and the interactions of its component parts. Systems Thinking is just that type of technique.","PeriodicalId":355861,"journal":{"name":"2020 IEEE Integrated STEM Education Conference (ISEC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126323803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ingrid J. Cruz, Michelle Soriano, Sarah Christie, Jazlynne Pichinte, Peter Chura-Borda, Adassa Alvarez, Ava Larkin, Jose Reyes
{"title":"Developing a Respiration Sensor for Babies","authors":"Ingrid J. Cruz, Michelle Soriano, Sarah Christie, Jazlynne Pichinte, Peter Chura-Borda, Adassa Alvarez, Ava Larkin, Jose Reyes","doi":"10.1109/isec49744.2020.9397847","DOIUrl":"https://doi.org/10.1109/isec49744.2020.9397847","url":null,"abstract":"We designed and built a wearable technology that quickly and accurately measures the respiration rate of an infant. Specifically, a low-cost sensing device that can accurately measure the respiratory rate of a baby. An accurate respiration measurement is critical because an elevated Respiratory Rate is a marker of serious respiratory illness and is the main indicator for childhood pneumonia which is the leading cause of death in children aged 0 to 5 years worldwide. We started the project by researching existing sensors in the market. We first narrowed down the 2 main ways of measuring an infant’ s respiration rate. The first way is contact-based while the second way was non-contact based. We decided contact-based was the best option since non-contact ways were more difficult to try. From contact-based, we figured out that there were 4 ways of measuring the respiration rate. These 4 were the acoustic method, the Co2 method, the airflow method, and the chest and abdominal method. The acoustic method needed a microphone and we imagined it would be hard to get a microphone for a baby. The Co2 method was also expensive to afford. We couldn’ t find a device to go along the airflow method. The last option was chest and abdominal movement and we looked into it and it seemed like the best choice if we use a flex sensor with it. Coding took the most time on the project because we had to learn how to do it from scratch. Our code was based on previously published codes we found online that we combined together in order to make our respiration sensor work. The final prototype has the following design features: -We used an expandable waistband with velcro lock to make it adjustable and allow appropriate fit on different infants while at the same time ensuring comfort for the baby. We also made it double layered in order to hold the sensor in place and catch every movement of the chest. -We also added a little cut in the waistband to allow the flex sensor to be removable, making the waistband washable - We made a pink waistband and a blue waistband for if the parents wanted a certain color for their child. -We also made the code have a special feature in which if the baby stops breathing then the code will assume the baby is ’ not breathing’ and a buzzer on the device will sound. -To top all of that, we added an LCD screen to show the readings and the whole system connects to a battery making our design very portable.","PeriodicalId":355861,"journal":{"name":"2020 IEEE Integrated STEM Education Conference (ISEC)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126028197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of stock correlation networks","authors":"Lixin Huang","doi":"10.1109/ISEC49744.2020.9397850","DOIUrl":"https://doi.org/10.1109/ISEC49744.2020.9397850","url":null,"abstract":"How to depict the relationships between stocks has always been a focus for scholars. Knowing the relationship between two stocks means that we can adjust the investment plans based on the correlation between the stocks. We are able to lower the risk of the portfolio while maintaining its expected return if we know the correlations between the stocks in the portfolio, assuming that information carries on through time In this study, we establish a method to depict the relationship between two stocks in a more generalized way, as to provide a new approach to find the relationship between two stocks other than correlation. The following four categories are taken into account: the correlation between the stocks, how close the stocks are in case of the category of the companies that issue the stocks, how frequently that the two stocks are mentioned together, and possible transaction in the business between the two companies that issue the stocks. To determine the relationships between stocks, an algorithm is initiated to generate a score between 0 and 1 for all four categories described above. Typically, a higher score indicates a more significant relationship between the two stocks. The data of the stocks are imported from the wind database, including the price and category of the stocks. The business transactions between the companies have been taken from D&B Hoovers. Primary and secondary sources about the stocks will be considered as textual evidence. On the basis of the algorithm, the following 4-step analyses have been conducted. First, the correlation between the two stocks is calculated using the covariance matrix from the DCC-GARCH model. We assume the score of the correlation section equals the correlation between the two stocks. Second, if the fields of the two companies that issued the stocks are closer, the score for this section will be higher. Third, the score for the business transaction between the companies is determined by the proportion of transactions between the two companies. Last but not least, the score for textual evidence will be calculated using the equation below.","PeriodicalId":355861,"journal":{"name":"2020 IEEE Integrated STEM Education Conference (ISEC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127155725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lyapunov Based Trajectory Tracking Dynamic Control for a QBOT-2","authors":"M.A.S. Vazquez, Mateusz Ardito-Proulx, S. Wadoo","doi":"10.1109/ISEC49744.2020.9397845","DOIUrl":"https://doi.org/10.1109/ISEC49744.2020.9397845","url":null,"abstract":"This paper presents the nonlinear kinematic and dynamic control for a QBOT2, a wheeled mobile robot (WMR). The work presents the design and simulation of a trajectory tracking controller for the system. The kinematic controller is a Lyapunov based nonlinear feedback control. The method of Backstepping is used to design the dynamic controller. The controllers are implemented on the system hardware using QUARC, a MATLAB-Simulink based software.","PeriodicalId":355861,"journal":{"name":"2020 IEEE Integrated STEM Education Conference (ISEC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131777337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing the Curriculum for a Minor in Cyber Criminology","authors":"R. Prasad, Liana Pennington","doi":"10.1109/ISEC49744.2020.9397830","DOIUrl":"https://doi.org/10.1109/ISEC49744.2020.9397830","url":null,"abstract":"We are living in an age of growing cyber crime and the costs associated with it. With more and more people and devices being connected through the Internet, there are plenty of opportunities for new kinds of criminal activity as the Internet provides cyber criminals with anonymity and global reach. According to the FBI, in 2018 the Internet Crime Compliant Center (IC3) [1] received 351,936 complaints with total losses exceeding $2.7 billion. The threat of cyber crime is real and pertinent when the Internet is intertwined with our everyday lives. We must prepare today’s undergraduate students, tomorrow’s future workforce, to fight this growing threat of cyber crime. If we do not prepare today, we will be vulnerable tomorrow. This paper details our experiences in developing and implementing an interdisciplinary minor in Cyber Criminology. The minor is designed for students who are interested in learning about cyber crime from the dual perspectives of computer science and criminal justice.","PeriodicalId":355861,"journal":{"name":"2020 IEEE Integrated STEM Education Conference (ISEC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132629406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tacksoo Im, Hyesung Park, Wei Jin, Richard Price, S. Dekhane, Robert Lutz, N. Abu-Halaweh
{"title":"Impact of a Free Textbook on an Introductory Programming Course","authors":"Tacksoo Im, Hyesung Park, Wei Jin, Richard Price, S. Dekhane, Robert Lutz, N. Abu-Halaweh","doi":"10.1109/ISEC49744.2020.9280714","DOIUrl":"https://doi.org/10.1109/ISEC49744.2020.9280714","url":null,"abstract":"Rising textbook costs has made students reluctant to purchase them. According to the review of Bureau of Labor Statistics (BLS) data, textbook prices has risen 88% since 2006 and the rate of its increase has been greater than tuition. Even parents do not have the ability to pay for the textbook for years. The high cost of textbooks has led many students to forego the purchase of textbooks and has led to underachievement in many cases. Anecdotally, the authors have determined that many students are not purchasing the textbook for a programming fundamentals course. In this paper, we present our findings in implementing a free textbook and its impact on students.","PeriodicalId":355861,"journal":{"name":"2020 IEEE Integrated STEM Education Conference (ISEC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131162713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Case Study of Asymmetries in Polar Rain Aurora","authors":"D. Herschbach, Yongliang Zhang","doi":"10.1109/isec49744.2020.9397841","DOIUrl":"https://doi.org/10.1109/isec49744.2020.9397841","url":null,"abstract":"Electrons and ions from the solar wind can directly enter Earth’s polar upper atmosphere on both closed and open magnetic field lines. This occurs via the magnetosphere, where these particles are energized. When they then hit the neutral atmosphere, they ionize/excite molecules and atoms. Excited neutrals subsequently emit photons when they return to their previous ground state, which can have different wavelengths and are often visible to the naked eye such as in aurora Australis or aurora Borealis. Because they originate from the solar wind, auroral observations can reveal some of the physical processes that occur in the space that surrounds the Earth. A special kind of aurora, polar rain aurora (PRA), is a phenomenon caused by solar wind electrons that enter the polar atmosphere directly on open field lines. Precipitating electrons, which are not energized/accelerated by the magnetosphere, often have low energy flux and don’t create visible aurora. However, satellite-based ultraviolet imagers have higher sensitivities and are able to detect lower energies. PRA events were obtained through a manual search of auroral images from the Global UltraViolet Imager (GUVI) on the Thermosphere Ionosphere Mesosphere Energetics and Dynamics (TIMED) satellite and the Special Sensor Ultraviolet Spectrographic Imager (SSUSI) on the Defense Meteorological Satellite Program (DMSP) satellites. While PRA often appears in symmetrical and homogenous shapes, we present multiple events that exhibit unique spatial variations and structures such as shifts, tilts, or gaps. These features are likely due to structures in the solar wind energetic electrons, the magnitude and orientation of the interplanetary magnetic field (IMF), magnetic field reconnection, magnetic variations on the high latitude magnetopause, and/or a combination of the four processes above. In order to fully understand PRA variations and structures, a comprehensive statistical study as well as global magnetosphere simulation is required.","PeriodicalId":355861,"journal":{"name":"2020 IEEE Integrated STEM Education Conference (ISEC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123804686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Levitating a graphite rod using the camelback effect","authors":"Anisha Iyer","doi":"10.1109/ISEC49744.2020.9397832","DOIUrl":"https://doi.org/10.1109/ISEC49744.2020.9397832","url":null,"abstract":"This project aims to investigate the relatively recently discovered “camelback effect” using my knowledge magnetic properties. In a system of two lines of transverse dipoles, the “camelback” field confinement effect can be recreated in a parallel dipole line system (PDL). The “camelback effect” occurs when two rows of magnetic dipoles are aligned to measure the strength of the field along the center axis. The magnetic field is stronger at the center and diminishes away from it. However, if the length of the dipole line exceeds critical length the field get stronger towards the edges of the dipoles and produces a confinement profile on the center axis that looks like a camel’s back. This camelback effect can be produced using special cylindrical magnets with poles on the curved side. The effect can also effectively trap an object at the center of the axis along the positive y-axis. A graphite rod can work as the trapped object and will levitate perpetually without any input power as a result of the camelback effect. The graphite rod can also be levitated using a checkerboard of magnets, alternating according to their North and South poles.","PeriodicalId":355861,"journal":{"name":"2020 IEEE Integrated STEM Education Conference (ISEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128671379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using properties of electromagnetism to construct speakers from paper cups","authors":"Anisha Iyer","doi":"10.1109/isec49744.2020.9397819","DOIUrl":"https://doi.org/10.1109/isec49744.2020.9397819","url":null,"abstract":"An electromagnet is a soft metal core that demonstrates magnetic properties after passing a current through a coil that surrounds. Modern speakers, which function as a result of interactions between electromagnets and permanent magnets, can be modeled using a paper cup, copper wire, neodymium magnets, a razor blade or sandpaper, an MP3 player, and some other related materials. First, the copper wire must be made into a coil of uniform radius. This is easiest when using a tool like a test tube. After coiling the wire, the coil must be unwinded such that a few inches of free wire are available on either end of the coil. Next, the ends of the wire must be stripped, with a razor blade or sandpaper, until the copper-colored wire turns silver. Using the corresponding materials, the wire must be stripped to reveal silver-colored wire which can pass current from the MP3 player. To replicate the interaction between the electromagnet and permanent magnet, an electromagnet must be induced and paired with a permanent magnet such as the neodymium magnet. Audio connector cables should run from the headphone jack of the MP3 player to the terminal conductor. Two alligator clips, each from separate cables, should then be attached to the conductor, preferably by soldering. The other ends of each cable should be clipped onto the stripped ends of the coiled copper wire. These connections allow the electric current coming from the MP3 Player to pass back and forth through the coil. Passing a current through the copper coil creates an electromagnet by inducing a magnetic field, the direction of which depends on the direction of current flow. The copper coil should be secured to the bottom of the paper cup, preferably using a material such as double-sided tape or glue that does not interfere with the integrity of the coil. If this material dislodges some turns of copper wire from the copper coil, this will cause a muffled sound. For simplicity, the neodymium magnets can be placed on a cake pan. With the copper coil secured to the bottom of the paper cup, the paper cup can be placed onto the stacked neodymium magnets such that the coil hangs over the column of magnets. The magnetic field from the electromagnet will stretch over the neodymium magnets in a helical shape. Such arrangements allow the magnetic properties of a copper coil to interact with the north and south poles of permanent magnets, namely the ones attached to the cake pan. As current passes back and forth through the coil, it is alternately attracted and repelled from the magnets on the cake pan. The resulting force pushes the bottom paper cup back and forth, which in turn pushes the air back and forth to produce sound waves. The cone shape of the paper cup concentrates and amplifies these sound waves.","PeriodicalId":355861,"journal":{"name":"2020 IEEE Integrated STEM Education Conference (ISEC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126217810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}