Asee peer logo
Displaying all 8 results
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Shuju Wu, Southeast Missouri State University; Ragu Athinarayanan, Southeast Missouri State University; Xiaobing Hou, Southeast Missouri State University; Sophia Scott, Southeast Missouri State University
Tagged Divisions
Information Systems
AC 2008-1887: INTEGRATED CURRICULUM AND LABORATORYDEVELOPMENT OF AN UNDERGRADUATE TELECOMMUNICATIONS ANDCOMPUTER NETWORKING PROGRAMShuju Wu, Southeast Missouri State University Shuju Wu (swu@semo.edu) is an Assistant Professor in the Department of Industrial and Engineering Technology at Southeast Missouri State University. She received her Ph.D. degree from the University of Pittsburgh. Her current teaching and research interests include telecommunications and computer networking, IP and overlay multicast, system design and analysis, and wireless ad hoc networks.Ragu Athinarayanan, Southeast Missouri State University Ragu Athinarayanan received his Masters and PhD degree in Electrical Engineering
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Azzedine Lansari, Zayed University; Akram Al-Rawi, Zayed University; Abdallah Tubaishat, Zayed Univeristy; Faouzi Bouslama, Université Laval
Tagged Divisions
Information Systems
AC 2008-1581: A COURSE SEQUENCE FOR INTEGRATING PROBLEMSOLVING AND CRITICAL THINKING IN A HYBRID OUTCOME-BASED IS/ITCURRICULUMAzzedine Lansari, Zayed University Azzedine Lansari received a Ph.D. from North Carolina State University in 1992. From 1993-1998, he was a senior researcher at MANTECH, NC. He joined the College of Information Systems at Zayed University in 1998. Currently he is an Associate Professor in the College of Information Technology. His research interests include systems modeling, educational technology and curriculum design in Information Systems.Akram Al-Rawi, Zayed University Akram Al-Rawi is a Sun certified Java Programmer and a Professor of CIS at Zayed University
Conference Session
Information Technologies Classroom Instruction
Collection
2008 Annual Conference & Exposition
Authors
Akram Al-Rawi, KFU; Azzedine Lansari, Zayed University
Tagged Divisions
Information Systems
University Azzedine Lansari received a PhD in Bioengineering from North Carolina State University in 1992. From 1992-1998, he was a senior researcher at Computer Sciences Corp. and MANTECH, Inc. He joined Zayed University in August 1998. Currently he is an associate professor of Information Technology. His teaching interests include instructional technology and statistical modeling. His research interests include systems modeling, educational technology and curriculum design. Page 13.768.1© American Society for Engineering Education, 2008 Integrating the Security+ exam Objectives
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Arunachala Nadar Mada Kannan, Arizona State University; Barbara Rempel, Arizona State University, Polytechnic campus; Lakshmi Munukutla, Arizona State University; Bert Valenzuela, Arizona State University
Tagged Divisions
Information Systems
validations, etc.Lakshmi Munukutla, Arizona State UniversityBert Valenzuela, Arizona State University Page 13.936.1© American Society for Engineering Education, 2008 NOVEL TECHNOLOGY FOR ELECTRONICS INSTRUCTION – AN ELECTRONICS STUDIOAbstractArizona State University’s Polytechnic campus recently received funding from theNational Science Foundation (NSF) under the Advanced Technology Education Program,or ATE grant, targeted for curriculum development. The program described in this paperis the development of an “eStudio”, to facilitate effective course delivery andcooperative learning in both the BS and AAS programs.The
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Okechi Egekwu, James Madison University
Tagged Divisions
Information Systems
to ease adoption pains. The paper will also discuss efforts at James MadisonUniversity to expose students to the various aspects of this technology.RFID NetworksAt the enterprise level, an RFID system will comprise many different technologies, includingbarcodes systems, passive and active tags, GPS/GIS systems, and chain of smart software – thehardware and software from different vendors must be seamlessly integrated. See Figure 1 forrepresentative auto ID technologies that one will find in a robust enterprise system. Transport Movement Item Packaging Unit Load Container unit
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
Curtis Welborn, Utah Valley State College; Reza Sanati-Mehrizy, Utah Valley State College
Tagged Divisions
Information Systems
EER notation. FIGURE 6. Original EER for Constraint 4ConclusionTemporal constraints are often integral to the correct operation of a business, yet they areseldom captured in a high-level notation such as EER. This means that the fundamentalinteraction of temporal constraints on the business are often only captured in detailedrequirements or, even worse, only in code.James Allen [2] defines a non-primitive relationship “in” which allows one interval bewholly within another interval. The “in” relationship would be an even more appropriaterelationship than the “during” relationship to be used for our examples. The “during”relationship was used because it is a primitive relationship and the introduction of non-primitive
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Richard Smith, U. of St. Thomas - St. Paul
Tagged Divisions
Information Systems
• Security technologies • Security planning and architectureWhile developing this course, the CIS department also developed an information security majorprogram that would fulfill US government requirements for information security education. Thedepartment would seek certification for the major under the Information Assurance CoursewareEvaluation Program9. Since the curriculum focuses on training “information securityprofessionals,” the department sought to meet the requirements of Instruction 4011 of theCommittee for National Security Systems7. Although this document dates from 1994, it is stillthe curriculum standard used by the US government. To support this, the course includesexercises to cover almost all “learning outcomes” listed in the
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Peng Li, East Carolina University; Tijjani Mohammed, East Carolina University; Lee Toderick, East Carolina University; Chengcheng Li, East Carolina University; Philip Lunsford, East Carolina University
Tagged Divisions
Information Systems
technology.Third, enrollments in our programs have increased significantly, especially in the distanceeducation sections, which has stretched laboratory resources to their limits, making it hard tomeet demands for remote labs. With virtual machine technology, it is possible to deploy adiversified virtual network lab at a minimal cost. The virtual machine technology permits rapidchanges, deployments, and adaptation of curriculum and laboratory experiences in step with the Page 13.80.2advances in technology. The purpose of this paper is to present the design and implementation ofa portable virtual network security lab, as part of our ongoing effort to