Asee peer logo
Displaying all 26 results
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Simin Hall, Virginia Tech; Clifford A. Shaffer, Virginia Tech; Eric Fouh, Virginia Tech; Mai Hassan ElShehaly, Virginia Tech; Daniel Breakiron, Virginia Tech
Tagged Divisions
Computing & Information Technology
students’ performanceas measured by their grades, students’ perceptions and opinions obtained on surveys, field notesfrom observing the classes, interview data at the end of the course, and the interaction logs thatour system records. After the pilot test, students’ average grade in the treatment group wasslightly (but not significantly) better than the control group on the post test. Students’ survey andinterview data indicated positive feedback about OpenDSA, with the average response on howwell they liked using the OpenDSA materials increasing after use as compared to a similar pre-test question about whether they would like to use such materials.1. IntroductionWe present our first evaluation results from an ongoing research and development
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jason St. John, Purdue University, West Lafayette; Thomas J. Hacker, Purdue University, West Lafayette; Raymond A Hansen, Purdue University; Natasha N. Nikolaidis, Purdue University; Robert M Trinkle, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
partnerships with peer departments and institutions.1 IntroductionInternational partnerships are frequently proposed, but many never make it beyond anexpression of mutual interest. The challenges to overcome are initiating first contact, discussingresearch areas to determine if there are overlapping areas or topics of mutual interest, seekingout and pursuing visiting and funding opportunities, and loss of initial momentum.To overcome these challenges, we have developed a process for building and strengtheninginternational partnerships in computing and information technology.2 Our Approach Page 23.567.2Our approach consists of three primary stages
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Maurice F. Aburdene, Bucknell University; Marie Catherine Pizzorno, Department of Biology, Bucknell University; Alexander P Thompson, Bucknell University
Tagged Divisions
Computing & Information Technology
complementary sequences of a four character alphabet (AGTC)representing the nucleotides, as shown in Figure 1. Page 23.636.3 Figure 1: A representation of a flattened segment of a double-sided DNA strandMeeting 1: Introduction2, 3, 4, 5, 6This meeting consisted of an introduction to the course, of students, course objectives, andcourse grading. The promise of genomics was discussed by referencing articles from both thepopular press and technical literature. Additional discussion points included fundamental tools,microscopes and spectrum analyzers, advances in computer chips, sequencing methods, andbioinformatics. Lastly, the students were engaged in
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona; Behdad Kavianpour, University of California, Irvine
Tagged Divisions
Computing & Information Technology
detect the presence of groups of collinear figure points. In this paper,the use of basic math such as the polar coordinate system, for line detection in an image wasdescribed. In these algorithms both mesh and tree connections of processors were exploited.1-IntroductionParallel computing for image processing has recently received considerable attentions 1,3,10,13.Technological advances have made the design of fine-grain architectures possible and many practicalalgorithms have been implemented. Line detection by the Hough Transform 1 method is a powerfultool in shape analysis. It extracts global features from images; however, because of its computationalcomplexity, it is not easily implemented in real-time for some applications. One approach
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Munish Sharma, Northern Illinois University
Tagged Divisions
Computing & Information Technology
suitable for Internet accessible remoteexperimentation. Considering the challenge, the authors have developed a custom designedLMS for an Internet accessible remote laboratory. This paper describes the design anddevelopment of an integrated facility with Internet accessible remote laboratory and an LMS. Interms of the remote experimentation part, it uses computer interfacing hardware and softwarefrom National Instruments (Input/Output cards and LabVIEW). The LMS part is mainlysoftware tools that are implemented by using MySQL and .NET technologies.1. IntroductionThe presence of computer technology in education has increased dramatically, and predictionsare that this trend will continue to accelerate. Many of the new technologies are
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University; Scott Pack
Tagged Divisions
Computing & Information Technology
(measured by credit-hours completed). Students’ programming backgrounds vary from none to paid programmers. • Lab equipment is limited. The class is large enough to require 15 identical lab stations. Therefore the system had to be designed so that the cost, multiplied by 15, was reasonable. Even with 15 stations students work in pairs, and two or three lab sections are required.Measurement of effectiveness of the student experienceIn line with the research goals of the lab experience measurements will be made of: 1. Students’ understanding of CPS 2. Students’ understanding of the pillars of IT relevant to this experience. 3. Students’ evaluation (opinion) of the relationship between CPS and IT.These
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
john pickard, East Carolina University; Te-shun Chou, East Carolina University; Philip J Lunsford II P.E., East Carolina University; John Spence
Tagged Divisions
Computing & Information Technology
controls for IPv6 (ACLs, Policies, etc)  Observe and mitigate first hop security threats  Implement control plane protection mechanisms  Observe and mitigate security threats introduced by transition mechanisms  Secure IPv6 networking (routing protocols, DNS, and MPLS)  Configure IPsec for IPv6Remote Lab environmentHands-on lab experience for the students was an essential element of this course. In theliterature there are numerous examples showing that lab experience plays a critical role instudent learning.1, 2, 18 Because this course is taught completely online, the labs must be eitherremote equipment or simulation. Literature shows that simulation software can limit studentcuriosity and experimentation.6 Therefore, to allow
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Raul Soto Jr
Tagged Divisions
Computing & Information Technology
heavily weighted withstudents from traditionally underrepresented groups, including women and minorities.Most students, whether at the undergraduate or graduate level, are reentering an academicenvironment after having been out in the working world for some time. Like any otheruniversity, NU is always considered a center of excellence with main objectives toprovide education, conduct research, in addition to providing public service to itsconstuents [1]. Similarly, National University Library System (NULS) supports alleducational and research activities of students, faculty, and staff of all of the affiliates ofthe National University System. Our library uses a Library Management System (LMS)that provides easy access to a countless array of
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Camilo Vieira, Eafit; Alejandra J. Magana, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
computational thinking practices:  Connecting Computing  Developing computational artifacts  Abstracting  Analyzing problems and artifacts  Communicating  Working effectively in teamsThey are grouped by seven big ideas and 23 key concepts as shown in Table 1. Page 23.301.4 Table 1 – Big Ideas and Key Concepts – CS Principles13 Big Idea Key Concept Creativity: Computing is a A. Computing fosters the creation of artifacts. creative activity. B. Computing fosters creative expression C. Programming is a
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
bytheir Center for Neural Basis of Cognition (CNBC). This minor is open to students in any majorof any college at Carnegie Mellon. This minor seeks to attract undergraduate students fromcomputer science, engineering, biology, statistics, and others. This minor requires a total of fivecourses. Four courses are drawn from neural computation, neuroscience, cognitive psychology,and intelligence system analysis areas, and one additional depth elective chosen one of the coreareas that is outside of the student’s major. This depth elective can be replaced by a one-yearresearch project in computational neuroscience27.Models for Integration of Computing Intelligence in CurriculumsTable 1 provides a list of computing intelligence course offerings of
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Duke Mejia Bulanon, Northwest Nazarene University; Stephen A. Parke P.E., Northwest Nazarene University
Tagged Divisions
Computing & Information Technology
c American Society for Engineering Education, 2013 Crop Monitoring System: A Case of Teaching Machine Vision through Undergraduate Research AbstractNorthwest Nazarene University, which is located in the Treasure Valley of Idaho, is developing acrop monitoring platform (CMP). The CMP, which uses a machine vision system, estimates fruittree parameters such as tree canopy volume and canopy reflectance characteristics. This researchproject, conducted by undergraduate engineering students, is integrated with the teaching ofmachine vision in a Control Systems course. This paper presents a case for teaching machinevision through undergraduate research.1. IntroductionNorthwest
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Carlos R Morales, Purdue University, West Lafayette; Perry Lucas Cox; Matthew John Farrenkopf; Robert Eric Knorr, Purdue University; Erick Morales; Christopher Gaeta; Martin Jerome Durchholz
Tagged Divisions
Computing & Information Technology
Internetaccess restriction imposed by some governments increased the technical challenges that wouldneed to be met by our solution.Prior to creating a custom solution, the group evaluated a wide range of commercial and open‐source streaming platforms using a robust set of objective criteria. The most important criteriawere identified as: (1) ability to stream content to any common client (PCs/Macs, Tablets,mobile phones), (2) ability to encode / transcode content into any necessary format in real‐timeor faster, (3) ability to adequately handle adverse conditions such as network congestion, and(4) ability to handle a large number of simultaneous client requests.B. system overviewTo accomplish encoding, the team erected a computing farm with a cluster of
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
. To begin, we discuss the structure of the course, the challenges that emerged, andthe development approaches that were employed. We conclude with the results of twoanonymous surveys on engagement; the first was given to students who participated in the class,while the second was sent to the general computing population of the university.BackgroundMilgram describes mixed reality environments as a spectrum, with the physical world at oneextreme and purely virtual environments at the other [1]. In purely virtual environments, most(if not all) aspects of the user experience are synthesized. However, because virtual objects areembedded within the physical world, AR lies between these two extremes. Its strong ties to thephysical world naturally
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Jeffrey H Wright; Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai
Tagged Divisions
Computing & Information Technology
; Oakes1 conducted research based on audiology records to help audiology technicianswhen the decision between an ITE, hearing aid worn ‘in the ear’, and a BTE, hearing aid worn‘behind the ear’. Audiology technicians generally will make the decision based on theaudiogram results and a consultation with the patient and the decision to be made at that point isgenerally pretty clear. However, there are occasions where the data leaves them in a spot wherethey can go either way. In these cases, they might “benefit from a second opinion given by anautomatic system with an explanation of how that second opinion was arrived at”1. The data thatAnwar & Oakes collected consisted of the audiograms, which graphs the auditory thresholds ofthe patient at 6
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Shaundra Bryant Daily, Clemson University; Juan E Gilbert, Clemson University; Wanda Eugene, University of North Carolina Charlotte; Christina Gardner-McCune, Clemson University; Kyla Alanna McMullen, Clemson University; Phillip Wendell Hall Jr, Clemson University ; Sekou L Remy, Division of Human Centered Computing - School of Computing, Clemson University; Damon Lamar Woodard, Clemson University; Tania Roy, Clemson University
Tagged Divisions
Computing & Information Technology
c American Society for Engineering Education, 2013   Alternate Pathways to Careers in Computing: Recruiting and Retaining Women Students      I. Introduction  The U.S. Department of Labor (2005) has predicted an increase in demand for computer systemanalysts (29%), database administrators (37%), and software engineers (38%). Even with theseincreasing demands, there is a severe lack of representation of minority women in the field.Participation of women in computing and information technology, although never equitable, hasdeclined during the past decade (Misa, 2010)1. With numerous reasons cited, includingstereotypes of the field, a lack of role models, and a desire to help others, attracting and
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Bahareh Azarnoush, Arizona State University; Jennifer M Bekki, Arizona State University; Bianca L. Bernstein, Arizona State University; George C Runger, Arizona State University
Tagged Divisions
Computing & Information Technology
describe the application of a particular data analysis tool, association analysis,and demonstrate its relevance to data generated by learners in an OLE. Specifically, wedemonstrate how association analysis can be used to: 1) better understand learner behavior on anOLE discovering common usage patterns in the site anf 2) identify the learner interactions withthe site that correspond to resultant learning of the site’s target learning objectives.The first of these analyses generates rules of the type “users who visited page x and page y alsovisited page z” and shed light common usage patterns. They can be used both for betterunderstanding how learners are interacting with an OLE and also for recommending particularpages. For examples, upon observing
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
individual embedded systems that are capable of 1. interacting with their environment through various sensors, 2. processing information locally, and 3. communicating this information wirelessly with their neighbors. “19A sensor node (embedded system) usually consists of three components which are19: • Wireless modules or motes – key components of the network which consists of a microcontroller, transceiver, power source, memory unit, and may contain few sensors. Examples: Mica2, Cricket, MicaZ, Iris, Telos, SunSPOT, and Imote2. • A sensor board which is mounted on the mote and is embedded with multiple types of sensors. Examples: MTS300/400 and MDA100/300. • A programming board (gateway board) – provides multiple
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Hoda Baytiyeh, The American university of Beirut
Tagged Divisions
Computing & Information Technology
analysis wasemployed and generated five factors: community influence, satisfaction, service quality,learnability and technical quality. Repeated measures ANOVA showed communityinfluence as the highest rated by participants, followed by satisfaction, service quality,learnability and technical quality. The findings are discussed providing evidence for theusefulness of implementing Moodle as a free open source course management system forboth teaching and learning.IntroductionMoodle, the most popular free open source course management system (CMS), wasdeveloped from a social constructivist perspective by Martin Dougmias in Australia 1.This free application provides instructors with useful features such as the ability to embedresources, activities
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Krystal S Corbett, Cyber Innovation Center; Chuck Gardner, New Orleans Military and Maritime Academy; Anthony Joseph Taffaro Jr., New Orleans Military and Maritime Academy; Marvin Nelson, Benton High School
Tagged Divisions
Computing & Information Technology
discuss artificial intelligence through computer science usingheuristics. Additionally, the students debate the ethics associated with artificial intelligence andwhen legal rights should apply to artificial beings.Teachers attend a week-long, immersive professional development workshop for Cyber Sciencethe summer prior to teaching the course6. Following the professional development workshopteachers gain access to all curriculum materials including lesson plans, master notes, andsupplemental documents which are found on NICERC’s website. Communication is maintainedthroughout the school year via the website allowing for any questions, concerns, or issues ateacher may experience when teaching the material.Narrative #1 – High School Teachers
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Dhana Rao, Marshall University; Rajeev K Agrawal, North Carolina A&T University (Tech); Venkat N Gudivada, Marshall University
Tagged Divisions
Computing & Information Technology
this paper, we illustrate how several high quality open source tools can be used to overcome some of these challenges. We identify various tasks that comprise the research workflow pipeline and discuss solutions for a subset of the tasks.1 IntroductionThe number of open access and online scholarly journals featuring disciplinary research hasincreased tremendously in recent years. Added to this is an increasing number of annual researchconferences which range in scope from regional to international. For example, there are literallyhundreds of international conferences being held every year in computer science discipline.Keeping track of advances even in a specialized area of an academic discipline is a challengingtask for
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Briana Lowe Wellman, University of the District of Columbia; Tommy Suriel, University of The District of Columbia; Evanna Maria Reynoso
Tagged Divisions
Computing & Information Technology
worse results in simulations.Figure 1: Robots disperse and search pre-agreed sectors. Since the environment is unknown, sectors aredetermined by using a semicircle to represent the environment. The arc of a semicircle is always 180°. If thereare N robots, then sectors can be divided and robot will disperse 180°/N apart.Sector Search with Rendezvous AlgorithmIn Sector Search with Rendezvous, robots explore pre-agreed areas or sectors and periodicallyrendezvous to share information about what was found. Each robot performs frontier-basedexploration in their sectors. Frontier-based exploration18 involves robots recursively exploring anunknown environment while building a map represented by an occupancy grid19. Robots use adistance sensor to detect
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Francis N Mensah, College of Engineering and Technology, Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
specific to CPS aspects of the system. Theuse of CPS in medical systems to collect, exchange, store and control electronic health data relyheavily on existing computer and communication technologies. These technologies expose themedical systems to similar threats that are familiar to conventional computer systems. Some ofthese threats, as mentioned by Venkatasubramanian and Gupta 9 include: Page 23.1057.7 1. Unauthorized access to health data 2. Deliberate alteration of health data, leading to incorrect diagnosis, treatment and ultimately fatality. 3. Deliberate generation of false alarms or suppression or real alarms raised by the
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
James P Cohoon, University of Virginia; J. McGrath Cohoon, University of Virginia; Luther A Tychonievich, University of Virginia; Catherine E. Brawner, Research Triangle Educational Consultants
Tagged Divisions
Computing & Information Technology
they have been unintentionally excluding girls.Evaluation of this session shows that 75% of the survey respondents strongly agreed that theinformation provided was useful (N=204) and over 60% of the 49 respondents to the summer2011 follow-up survey indicated that they had used the information during the prior school year.CS1 redesignThere have been several successful attempts in recent years to modify CS1 pedagogy andpractices to make the curriculum interesting to diverse groups of people.1, 19, 12 We alwaysinclude a session with a CS1 instructor whose practices are particularly encouraging to womenand minorities. The CS1X effort developed at University of Virginia has been of particularinterest to high school computer science teachers because
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Brian R. King, Bucknell University; Ashwin Satyanarayana, New York City College of Technology
Tagged Divisions
Computing & Information Technology
committee and fine tuned based on our own experience7. 1. Introduction. Basic concepts, definitions and terminology of data mining should be covered here. Motivate the field with real-world applications of where data mining has been used. We encourage you to discuss current uses of data mining by pulling examples from various news repositories. Discuss some of the implications of data mining, such as privacy and ownership. Using the examples from the news and current events, discuss the different kinds of data repositories on which data mining can be performed. Encourage them to think about the different kinds of patterns and knowledge that can be mined. Introduce the idea of what it might mean
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
1451 standards and discusshow to create WSNs and intelligent interactive devices, and interface with smart sensors andtransducers. Moreover, the WirelessHART(Highway Addressable Remote Transducer), IEEE1451, ZigBee / 802.15.4, and 6LoWPAN standards will be explained. Networking actuators andsmart sensors and real-world technical challenges will also be highlighted.Advances in computing and instrumentation have sparked the need of engineering technologygraduates who can update and improve manufacturing facilities and product design. This paper isan attempt to expose engineering technology students earlier to WSNs and other emergingtechnologies in lieu of taking WSN track in their technology curriculum.1. IntroductionThe field of wireless
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Lifang Shih, Excelsior College; Jane A LeClair, Excelsior College
Tagged Divisions
Computing & Information Technology
studentlearning are documented in the Institutional Assessment Plan of Student Learning (IAPSL).Under the College’s assessment framework, the School of Business and Technology develop anassessment plan that incorporates a systematic process to measure the achievement of fourinterrelated categories of student learning outcomes – program educational objectives (PEOs),and program (student) outcomes (PO/SOs). Page 23.1299.3Following Huba & Freed’s1 process for assessment of student learning, SBT adopts thefollowing eight steps in developing the assessment plans for the intended outcomes: 1. Develop articulated statements of intended goals/outcomes