Asee peer logo
Displaying all 16 results
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University; Guy Hembroff, Michigan Technological University
Tagged Divisions
Information Systems
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION ANDDEFENSE SIMULATIONYu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological University. His research interests include network protocols, distributed systems and cyber security. He received his Ph.D. in Computer Science from University of Colorado in 2005. He is a memeber of IEEE and ACM.Guy Hembroff, Michigan Technological University Mr. Guy Hembroff is an Assistant Professor within Michigan Tech University's School of Technology Department. His research interests are within the areas of cyber security, network protocols, encryption methods, health-care
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Barry Lunt, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
2006-960: CHANGING TIMES: THE STATUS OF COMPUTING EDUCATION INTHE UNITED STATESBarry Lunt, Brigham Young University Barry M. Lunt is an Associate Professor of Information Technology at Brigham Young University in Provo, UT. Dr. Lunt received a B.S. and an M.S. degree in EET from BYU, and a Ph.D. in Occupational and Adult Education from Utah State University in Logan, UT. He has spent seven years in industry as a design engineer, and 19 years in engineering technology education. His present research emphases are the physical design of electronic circuits and systems, IT curriculum, and engineering technology education.Joseph Ekstrom, Brigham Young University Joseph J. Ekstrom (Ph. D
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Barry Lunt, Brigham Young University; Gordon Romney, Brigham Young University
Tagged Divisions
Information Systems
systems, computer-based library science, computerengineering, software engineering, and information technology. Additionally, there arenewly-emerging programs in disciplines that are heavily computer-dependent, such asanimation, industrial design, bioinformatics, and others.The purpose of this paper is to present the history and current status of the five corecomputing academic disciplines as described in the Computing Curriculum document:computer science, information systems, computer engineering, software engineering, andinformation technology. The information summarized includes the number of programsin existence, the development of a standardized curriculum for each, and the developmentand implementation of accreditation standards for
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Frank Kowalkowski, Knowledge Consultants; Gilbert Laware, Purdue University
Tagged Divisions
Information Systems
. Using a tool for frequency analysis you canshow the number of interactions of technology and those associated with the current processes. The frequency is very balanced and evenly distributed in this example What does this mean? Technology Instance Rank Report Matrix Model: Process impact on tech Number of Occurrences: 19 Process Instance Rank Report 1 4.0 Purchasing Application Matrix Model: Process impact on tech 2 4.0 Search Engines Number of Occurrences: 19 3 3.0 Printers 1 3.0 Place Order 4 2.0 Internet Communications 2 3.0 Determine Prices 5 2.0 Storage Devices
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Philip Lunsford, East Carolina University; Lee Toderick, East Carolina University; Daniel Brooker, East Carolina University
Tagged Divisions
Information Systems
2006-559: A REMOTELY CONTROLLED AND ISOLATED COMPUTERNETWORK TEST BED FOR ATTACK UNDERSTANDING BASEDINFORMATION ASSURANCE DISTANCE EDUCATION COURSESPhilip Lunsford, East Carolina University Phil Lunsford received a B.S. in Electrical Engineering and a M.S. in Electrical Engineering from Georgia Institute of Technology and a Ph.D. in Electrical Engineering from North Carolina State University. He is a registered professional engineer and is currently an Assistant Professor at East Carolina University. His research interests include system simulation, telemedicine applications, and information assurance.Lee Toderick, East Carolina University Lee Toderick received a B.S. in Computer Science from
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ronald Glotzbach, Purdue University; Nathan Bingham, Purdue University; Meiqi Ren, Purdue University; Dorina Mordkovich, Purdue University
Tagged Divisions
Information Systems
2006-2586: E-STADIUM: REAL-TIME GAME STATISTICS, HIGHLIGHTS, ANDENTERTAINMENTRonald Glotzbach, Purdue University Ronald J. Glotzbach is an Assistant Professor for the Interactive Multimedia Development area in the Department of Computer Graphics Technology at Purdue University’s West Lafayette campus. He is also the Purdue football e-Stadium Project Manager for ITaP. Ronald’s research interests include leading-edge technologies that expand the boundaries of dynamic and interactive content delivered and collaborated on via the graphical communication tool that is the web. Related interests include web-enabling software, dynamic content delivery methods, programming graphics, and integration
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Akram Al-Rawi, Zayed University; Azzedine Lansari, Zayed University; Faouzi Bouslama, Zayed University
Tagged Divisions
Information Systems
Azzedine received a PhD in Biomedical Engineering from North Carolina State University in 1992. From 1992-1998, he was a senior researcher at MANTECH, NC. He joined Zayed University in August 1998. Currently he is an assistant professor of Information systems. His research interests include systems model-ing, educational technology and curriculum design in Information Systems. His teaching interests include instructional technology and statistical modeling.Faouzi Bouslama, Zayed University Faouzi received a PhD in Electronics Engineering from Shizuoka University, Japan, in 1992. From 1992-1994, he was a researcher at Toshiba Co., Tokyo. From 1994-2000, he was Associate Professor of
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Shelton Houston, University of Southern Mississippi; Christopher Herrod, University of Southern Mississippi; Steven Blesse, University of Southern Mississippi
Tagged Divisions
Information Systems
industry experience. Mr. Herrod’s current teaching and research include client-server networking, internetworking, and information security. He has obtained the CompTIA A+ certification, Cisco Certified Network Associate, and Cisco Certified Academy Instructor.Steven Blesse, University of Southern Mississippi Mr. Blesse is an instructor in the School of Computing at the University of Southern Mississippi. He has a M.S. in Engineering Technology from the University of Southern Mississippi and has 14 years of industry and military experience. Mr. Blesse’s current teaching and research include client-server networking and network management, network security and penetration testing, and
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATIONMario Garcia, Texas A&M University-Corpus Christi Page 11.277.1© American Society for Engineering Education, 2006 Biometric Authentication Tool for User Identification Based on Keystroke DynamicsAbstractBiometric access methods for computer systems are gaining popularity because of governmentaland corporate businesses' increased focus to secure sensitive data on computer systems andnetworks. Biometrics is the science of measuring a unique physical characteristic about anindividual as an identification mechanism. Keystroke Biometrics is a relatively new method
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Alan Price, DeVry University-Pomona
Tagged Divisions
Information Systems
2006-754: ASSESSMENT OF COGNITIVE STYLE PREFERENCE THROUGHCLICK-STREAM ANALYSIS OF EDUCATIONAL HYPERMEDIA USER CHOICEAND BROWSING PATTERNS: A CONCEPTUAL MODELAlan Price, DeVry University-Pomona Alan Price is the Associate Dean of Technology Programs at DeVry University, Pomona campus. He holds a Masters of Engineering degree from Cornell University and he is currently working on his Ph.D. in Management of Information Systems from Claremont Graduate University. His research interest include security of wireless sensor networks and effective learning and pedagogical support through use of adaptive hypermedia technologies
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy; Curtis Welborn, Utah Valley State College; Afsaneh Minaie, Utah Valley State College
Tagged Divisions
Information Systems
2006-1628: REPRESENTING AND ENFORCING BUSINESS RULES INRELATIONAL DATA MODELReza Sanati, Utah Valley State College REZA SANATI MEHRIZY is an associate professor of the Computing and Networking Sciences Dept. at Utah Valley State College, Orem, Utah. He received his MS and PhD in Computer Science from University of Oklahoma, Norman, Oklahoma. His research focuses on diverse areas such as: Database Design, Data Structures, Artificial Intelligence, Robotics, and Computer Integrated Manufacturing.Curtis Welborn, Utah Valley State CollegeAfsaneh Minaie, Utah Valley State College AFSANEH MINAIE is an associate professor in the Engineering Department at Utah Valley State College. She received a B.S
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
Tagged Divisions
Information Systems
2006-1831: SECURITY EDUCATIONTim Lin, California State Polytechnic University-PomonaSaeed Monemi, California State Polytechnic University-Pomona Page 11.1109.1© American Society for Engineering Education, 2006 Security EducationAbstract:Network security and computer security are usually hot topics whenever any intrusion incidentscause system crash and loss of work time in big corporations. In engineering colleges howeversecurity is usually a topic with least or incompatible attention.The author has taught many upper division classes in college and also graduate course(s) and hasbeen trying to imbue and enhance the courses with the security
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Luiz Perrone, Bucknell University; Maurice Aburdene, Bucknell University
Tagged Divisions
Information Systems
. His research on the application of computer simulation to the study of the security properties of wireless networks is supported by the Office for Domestic Preparedness, U.S. Department of Homeland Security, via the Institute for Security Technology Studies at Dartmouth CollegeMaurice Aburdene, Bucknell University MAURICE F. ABURDENE is the T. Jefferson Miers Professor of Electrical Engineering and Professor of Computer Science at Bucknell University. He has taught at Swarthmore College, the State University of New York at Oswego, and the University of Connecticut. His research areas include, parallel algorithms, simulation of dynamic systems, distributed algorithms, computer
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Phillip Wilson, Texas A&M University-Corpus Christi; John Fernandez, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
://robotik.inflomatik.info/other/opencv/OpenCV_ObjectDetection_HowTo.pdf, June20 2003.2. Bishop, M., Computer Security, Art and Science,. Massachusetts: Pearson EducationInc., 2003.3. Cristinacce, D. and Cootes, T., Facial feature detection using AdaBoost with shapeconstraints. British Machine Vision Conference, 2003.4. The Facial Recognition Technology (FERET) Database, National Institute ofStandards and Technology, 2003. http://www.itl.nist.gov/iad/humanid/feret/5. Fernandez, J.D., Human-computer interaction closes the software engineering gap,Computers in Education Journal, vol. XV, no. 3, July – September 2005, 96-100..6. Fernandez, J.D., Fernandez, M.A., & Priesmeyer, R., Experimenting with an emotionsmeasurement instrument in usability testing
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ed Crowley, University of Houston; Cheryl Willis, University of Houston
Tagged Divisions
Information Systems
2006-2516: OPEN SOURCE SOFTWARE AND LIVE LINUX CDS: ELEMENTS OFSUCCESSFUL LAB MODULESCheryl Willis, University of HoustonEd Crowley, University of Houston Ed Crowley, a former IS Director, developed the four course security specialization at UH’s College of Technology. This is the only NSA/CNSS certified (4011/4014) program in Houston. Mr. Crowley holds multiple INFOSEC certifications from the National Security Agency (NSA). He has also earned the usual vendor certifications from Cisco, CompTIA, and Microsoft. In addition to having held governmental security clearances, he is a graduate of the Military Police Academy
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Fani Zlatarova, Elizabethtown College
Tagged Divisions
Information Systems
significant amount of information systems-related issues. The number ofinformation systems users increases every day.How do we know if our students are well prepared to develop software applications meeting therequired standards? Do they have the right knowledge and skills beyond the technological level?What would be the optimum mix of theoretical and practical material for them?Curricula designed for engineering students include courses related to the development,management, and processing of database (DB) systems and information systems (ISs). Querydefinition and processing is one of the most important topics considered in such courses. Theentire organization of an IS is oriented towards the efficient and effective execution ofcorresponding queries