Asee peer logo
Displaying all 12 results
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Arunachala Nadar Mada Kannan, Arizona State University; Barbara Rempel, Arizona State University, Polytechnic campus; Lakshmi Munukutla, Arizona State University; Bert Valenzuela, Arizona State University
Tagged Divisions
Information Systems
balance of furnishings and to implement a “knock-off” version ofthe technology. The committee and the department chair put the emphasis on thedevelopment of the technology components of the studio, understanding that it would bean evolving project. The phases of development would first target collaborative learning,then distance learning, and ultimately, the goal would be to achieve a RemotelyInteractive Laboratory with some of the capabilities of model programs such as the one inplace at L’École Polytecnique Fédérale de Lausanne (EPFL), in Switzerland [1] and thatof Northern Alberta Institute of Technology and Athabasca University’s teachinglaboratories [2].Implementation of eStudioBy the end of the spring semester of 2007, the plan for eStudio
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Richard Smith, U. of St. Thomas - St. Paul
Tagged Divisions
Information Systems
and, in somecases, advanced math courses. This was not the introductory course we wanted to teach.We decided to plan a course with the following properties: • Prerequisites limited to introductory programming and a college math course • Course work would promote higher order thinking skills according to Bloom’s taxonomy of cognitive learning levels4. • Content would teach students practical information security skills: skills that would help students analyze real-world security situationsIn our search for support of this alternate course model, we examined numerous textbooks. Atthe high end are books like Bishop1 that focus on a mathematical treatment of the subject. Othertexts, like Whitman and Mattord 11 do not
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Shuju Wu, Southeast Missouri State University; Ragu Athinarayanan, Southeast Missouri State University; Xiaobing Hou, Southeast Missouri State University; Sophia Scott, Southeast Missouri State University
Tagged Divisions
Information Systems
received donations from Falcon Communications Inc. and TimeWarner Telecom including a Nortel DMS-10 switching system, an IP/PBX, IP phones, andSONET OC-3 add/drop multiplexers. Together with the equipment in the current two networkinglaboratories, we plan on developing an integrated advanced TCN laboratory. It will present anintegrated network environment where traditional telephone network, VOIP, data network andbackbone fiber optic network coexist with data, voice and video traffic. Figure 2 shows thefuture advanced TCN laboratory configuration.The DMS-10 system is a carrier class central office switching platform offering service optionsranging from simple dial tone to advanced voice and data networking. Our DMS-10 can supportup to 10,000 lines
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Barry Cumbie, Auburn University; Chetan Sankar, Auburn University; P.K. Raju, Auburn University
Tagged Divisions
Information Systems
,generate revenue for the community. The range of infrastructure data therefore includes “as-built” drawings of the original building properties, drawings of structural and property Page 13.1261.6modifications, surveys of property lines, locations of structures such as fences and swimmingpools, locations of sub-concrete utility access (water, sewer, telecommunications, electrical),stress points, and electrical plans. These data and any other information that is generated at anystage of construction or maintenance of real estate rental property are highly customized for eachproperty and are typically stored as rolled drawings or in other physical
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
Kyle Lutes, Purdue University; Richard Mislan, Purdue University, West Lafayette
Tagged Divisions
Information Systems
doctoral dissertation, preparing the ultimate online resource for his course in Small Scale Digital Device Forensics, and planning the annual Mobile Forensics World Conference. Page 13.1212.1© American Society for Engineering Education, 2008 WinMoFo: The Development of a Forensics Tool for Windows Mobile DevicesAbstractThe ubiquity of mobile computing devices (e.g. smartphones), our society's ever increasing useof these devices, and the continual appearance of these devices at crimes scenes has created aneed for tools to aid in the acquisition of critical, time-sensitive evidence
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
Curtis Welborn, Utah Valley State College; Reza Sanati-Mehrizy, Utah Valley State College
Tagged Divisions
Information Systems
AC 2008-929: TEMPORAL EXTENSIONS FOR ENHANCED ENTITYRELATIONSHIP NOTATIONCurtis Welborn, Utah Valley State CollegeReza Sanati-Mehrizy, Utah Valley State College Page 13.1194.1© American Society for Engineering Education, 2008 Temporal Extensions for Enhanced Entity Relationship NotationAbstractAn organization can have many business rules to implement in their daily operations.When these rules deal with the planning of business operations, there can be a strongneed to specify the temporal relationships between business objects. Software engineersare seldom educated as to the use of temporal logic though it is often needed to accuratelyexplain time-based relationships
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Clifton Kussmaul, Muhlenberg College
Tagged Divisions
Information Systems
info online.” “Easy to change things/update/store/share.” “It’s easy for people on a team to communicate.” “It kept me on schedule of what to do.” • Fall 2007 “Easy to communicate with all group members and teacher with one post. Difficult to use at first but smooth after.” “Trac allowed for smoother collaboration. I will probably use Trac if I work in teams with software.” “Organizing and planning for projects was easier with tickets.” “[Trac] works well to organize large projects but for smaller ones, it just makes more busy work and doesn’t help
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Abul Azad, Northern Illinois University; Ghayasuddin Mohammed, Northern Illinois University; Mohammed Murtuza, Northern Illinois University; Muhammed Abedur Rahman, Northern Illinois University
Tagged Divisions
Information Systems
inputs and boundary conditions1, 2. A virtualfacility can have two purposes: a) to facilitate the feasibility study of an engineering systemwhile in the planning stage, and based on the study, designers can adjust the parameters duringtheir final planning so the anticipated system can serve its purpose and b) to study the behaviorand control of a complex engineering system for educational and research purposes withoutbuilding the system. The development of these virtual facilities can involve expertise withcomplex mathematical solutions with tedious software developments and effective graphical userinterface 3. Considering the level of involvement, sometimes it is difficult for an individualinstitution to develop and maintain such
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Denise Bauer, Pennsylvania State University, University Park; Gül Okudan, Pennsylvania State University
Tagged Divisions
Information Systems
affect the learning ofthose individuals?MethodologyResearch questions, indicated above, require a comprehensive multi-method data collection. Thedata collection and related results will be presented in a series of publications. This paper is thefirst in the series. Below first we summarize plans for data collection and related instruments forthe comprehensive study. Then, we provide details on the completed pilot study.Overall, students will be asked, through surveys and focus groups, what type of technologicalcommunication, if any, they currently use to complete group work, if they have had anyexperience with remote group work, and their perceptions on incorporating group work throughtechnology into the engineering curriculum. These data will
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Peng Li, East Carolina University; Tijjani Mohammed, East Carolina University; Lee Toderick, East Carolina University; Chengcheng Li, East Carolina University; Philip Lunsford, East Carolina University
Tagged Divisions
Information Systems
operatingsystems; so we chose VMware in building the new virtual networking lab.In the early trials in our Intrusion Detection Technologies Lab5, only one Linux virtual machinewas built for the students to use as the server (target). The host machine was used as the client.We had some degree of success with this setup. However, there were also problems: • With only one virtual machine, it was difficult to implement labs involving multiple hosts, For example, setting up an intrusion detection system with sensor and console was planned but not implemented. • Students had different operating systems on their personal computers: Windows 2000, XP, Vista and even Linux. Because they needed to use the host machine as the client
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Okechi Egekwu, James Madison University
Tagged Divisions
Information Systems
event-driven applications thatreact intelligently to accurate real-time information.4Most enterprise management systems (Enterprise Resource Planning, Inventory Systems, andSupply-Chain Management Modules) are all process-driven. They are not agile and always reactlate after an event has occurred. A shift to an event-driven enterprise management system wouldmean that business applications would only run when an event triggers it instead of eitherrunning all the time or at specified intervals. It will be challenging and cost prohibitive for theindividual user (company) of RFID systems to develop the robust RFID network components ofthe type that have been described above. The encouraging development is that individual systemsdevelopers and
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
David Dampier, Mississippi State University
Tagged Divisions
Information Systems
Communication Technologies, June 16-18, 2004, Las Vegas, NV.3. Bogen, A. and D. Dampier, “Preparing for Large-Scale Investigations with Case Domain Modeling,” Proceedings of the 2005 Digital Forensics Research Workshop (DFRWS), New Orleans, LA, August 17-19, 2005.4. Bogen, A. and D. Dampier, “A Software Engineering Modeling Approach to Computer Forensics Examination Planning,” Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), Taipei, Taiwan, November 7-10, 2005.5. Bogen, A., D. Dampier, and J. Carver, “Domain Modeling in Computer Forensics Examination: An Empirical Study”, Proceedings of the 2007 Hawaii International Conference on the System Sciences