- Service-Oriented Architecture and Web Services
- Advanced Software Engineering Methodologies
- Mobile Agent-Based Network Management
- IPv6, Mobility, Handover, Networks, Security
- Model-Driven Software Engineering Techniques
- Gaze Tracking and Assistive Technology
- Teaching and Learning Programming
- EEG and Brain-Computer Interfaces
- Online Learning and Analytics
- Intelligent Tutoring Systems and Adaptive Learning
- Software Testing and Debugging Techniques
- Educational Games and Gamification
- Software Reliability and Analysis Research
- Wireless Communication Networks Research
- Software System Performance and Reliability
- Mind wandering and attention
- Network Packet Processing and Optimization
- Information and Cyber Security
- Context-Aware Activity Recognition Systems
- Innovative Teaching and Learning Methods
- Business Process Modeling and Analysis
- Visual and Cognitive Learning Processes
- Flow Experience in Various Fields
- Mobile Learning in Education
- Web Application Security Vulnerabilities
Georgia Southern University
2014-2025
Florida International University
2007-2011
University of Miami
2009-2011
The process of learning is not merely determined by what the instructor teaches, but also how student receives that information. An attentive will naturally be more open to obtaining knowledge than a bored or frustrated student. In recent years, tools such as skin temperature measurements and body posture calculations have been developed for purpose determining student's affect, emotional state mind. However, measuring eye-gaze data particularly noteworthy in it can collect non-intrusively,...
Teachers use observational cues in the classroom to identify attentiveness of students and guide pace their lecture. However, effectiveness this technique decreases with increasing class size. This paper presented an approach for automating these from students' facial expressions identifying via a neural network machine learning model. Results deep Convolutional Neural Network model were then compared range confidence values obtained cloud-based emotion recognition service correlations human...
Improving the quality of software developed in 21st century is one major challenges industry. Addressing this problem will require that academic institutions play a key role training developers to produce high software. Unfortunately, students and instructors continue be frustrated by lack support provided when selecting appropriate testing tools program analyzers verify programs under development.
SUMMARY Advances in communication devices and technologies are dramatically expanding our capabilities enabling a wide range of multimedia applications. The current approach to develop communication‐intensive applications results products that fragmented, inflexible, incapable responding changing end‐users' needs. These limitations have resulted the need for new development building driven by end‐users support dynamic nature communication‐based collaboration. To address this need,...
A survey on the landscape of self-adaptive systems identified testing and assurance as one most neglected areas in engineering autonomic software. However, since structure behavior software can vary during its execution, runtime is critical to ensure that faults are not introduced into system a result dynamic adaptation. Some researchers have developed approaches supporting designs for integrating workflow In this paper, we describe comparative case study performed three applications were...
The combination of domain-specific modeling languages and model-driven engineering techniques hold the promise a breakthrough in way applications are developed. By raising level abstraction specializing building blocks that familiar particular domain, it has potential to turn domain experts into application developers. Applications developed as models, which interpreted at runtime by specialized execution engine order produce intended behavior. This approach been successfully applied...
As the demand for secure coding education grows, there is a need improvements in how taught and preparing students to develop more software. time Computer Science classroom finite, educational efforts should be placed on targeting most common types of vulnerabilities better prepare avoid security pitfalls coding. Existing research this area mainly focuses developing vulnerability detection tools rather than analyzing commonly produced by students. Limited exists determining student-produced...
This Innovative Practice Full-Paper presents a system for real-time accurate detection of classroom attentiveness using monitor-mounted webcams and eye trackers. Academic institutions instructors cannot accurately assess the moment-to-moment students in classrooms where students' faces are obscured by computer monitors. can cause lectures Computer Science, Information Technology, or other lab-based courses to be incorrectly paced, which leads having overall poorer grasps subject material. We...
The diversity of communication media now available on IP networks presents opportunities to create elaborate collaborative applications. However, developing applications can be challenging when using the traditional stovepiped development approach with lengthy cycle as well limited utility. One proposed solution this problem is Communication Virtual Machine (CVM). CVM uses a user-centric (UCC) reduce complexity while offering operating simplicity developers and users services. currently...
The convergence of various multimedia communications that includes voice, video and data presents many opportunities for enabling unified communication but paradoxically leads to inefficiencies the user as may become complex. Model driven technologies such Communication Virtual Machine (CVM) propose reduce complexity through use models define a user's needs. CVM was extended utilize multiple common-off-the-self (COTS) APIs Skype Smack which we refer frameworks, promote service network...
Programming is a skill, often acquired through repeated practice and feedback. During traditional lectures, students not actively engaged in their own learning. It imperative to pique motivation direct focus on gaining the requisite knowledge. As class size grows, instructors feedback delayed that impacts student engagement Educational researchers have supported using web-based tools help evaluate work, provide timely increase amount of time they spend improving skills. Motivated by previous...
The functionality of communication applications, such as instant messaging, has dramatically improved due to market competition. quest for the competitive edge resulted in development open platform APIs that allow applications become building blocks, or frameworks more elaborate applications. services available through these different can however be quite dissimilar, revealed from a survey some frameworks. In this paper we propose an architecture utilizes multiple and autonomic computing...
One challenge to the cloud computing paradigm is task complexity associated with designing and managing multi-cloud solutions based on operational objectives. Heterogeneous vendor interfaces a lack of standardization compounds this may eventually lead lock-in. In article we present model driven approach allowing network administrators intuitively describe rapidly realize non-trivial IaaS behavior in realtime. We have developed iCloudML, an interpreted domain-specific modeling language its...
The growth and popularization of wireless connectivity mobile devices have allowed the development smart spaces that were previously only envisaged in approach proposed by Mark Weiser. These environments are composed many computational resources, such as applications, along with user, who must be able to associate use these features. However, programming is a challenging task, since dynamic nature heterogeneous addition requirement interactions between users resources performed coordinated...
The pervasiveness of complex communication services and the need for end-users to play a greater role in developing have resulted creation Communication Virtual Machine (CVM) technology. CVM technology consists Modeling Language (CML) CVM. CML is declarative modeling language that can be used specify domain-specific platform realize models.In this paper we explicitly define operational semantics support (1) synthesis models into executable control scripts (2) handling negotiation media...
This Research to Practice Full Paper presents our Non-intrusive Classroom Attention Tracking System (NiCATS) and discusses the data collected through it. Academic instructors institutions desire ability accurately autonomously measure students' attentiveness in classroom. Generally, college departments use unreliable direct communication from students, observational sit-ins, end-of-semester surveys collect feedback regarding their courses. Each of these methods collecting is useful but does...
Teacher self-efficacy (SE) has been observed to be an 'important construct for Computer Science (CS) teachers' professional development because it can predict both teaching behaviors as well student outcomes" [1]. The purpose of the present study was investigate teacher CS SE during a two-year federally funded (PD) and curriculum project middle school teachers incorporating game-design Unity platform. research question investigated is: How does computer science via game design with platform...