Asee peer logo
Displaying all 16 results
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Ibraheem A. Kateeb, North Carolina A&T State University; Larry Burton, North Carolina A&T State University; Naser El-Bathy P.E., North Carolina A&T State University; Michael S. Peluso, North Carolina A&T State Univerisity
Tagged Divisions
Computing & Information Technology
technology at North Carolina A&T State University. He earned his B.S. degree from Wayne State University, Mich., M.S, (computer science, 2006) from Wayne State University, and Ph.D. (information technology, 2010) from Lawrence Technological University. El-Bathy is currently teaching at the North Carolina A&T State University. His interests are in health informatics, bioinformatics, artificial intelligence, intelligent infor- mation retrieval, and intelligent web development. El-Bathy may be reached at nielbath@ncat.edu.Mr. Michael S. Peluso, North Carolina A&T State Univerisity Mike Peluso has been involved in high technology management and support for the better part of two decades. Peluso started his career
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Abby M Kelly, University of Washington; Evan T. Curtis, Univeristy of Nebraska, Lincoln; Johnathan Ian Edward McCoy, University of Nebraska, Lincoln; Dennis D. Schulte P.E., University of Nebraska, Lincoln; David Jones, University of Nebraska, Lincoln
Tagged Divisions
Computing & Information Technology
table showed the correlation of the desired 3-5 year post graduationcompetencies of the PEOs to their foundation in student outcomes A.1-K. Table 1 AGEN Mapping of Student Outcomes to PEOs Student Outcomes PEOs A.1 A.2 B C D E F G H I J K 1 S S S S M S M S M M S S 2 M M M S L S M L M S S S 3 S M S S L S L S M S S S 4 M M L L S
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Tokunbo Ogunfunmi, Santa Clara University
Tagged Divisions
Computing & Information Technology
course also involves completion of a simple projectwhich involves real-time simulation of a MATLAB/Simulink-based speech codingalgorithm for coding speech [9]. Page 25.960.4Analog telephone systems have mostly been replaced by digital telephone systems. Butwith the advent of digital systems, the speech can be coded and has more flexibility, easeof regeneration and security than analog systems. But the disadvantage of digital systemsis it requires larger bandwidth. The speech coding technology has gone through a numberof phases starting with the development and deployment of PCM and ADPCM systems.The 64 kb/s Log-PCM and 32 kb/s ADPCM systems which have
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alexander A. Kist, University of Southern Queensland
Tagged Divisions
Computing & Information Technology
as it provides high bandwidth access at avery low latency.Fixed Wireless BroadbandFWB access is suitable for fringe areas, metro black spots and sparsely populated areas withsuitable propagation characteristics, i.e. not mountainous. It will rely on 4G mobile technology(IMT advanced) with peek data rates of 1Gbit/s. Latency of the access component of the networkis low by design, i.e. 10ms under ideal conditions. This has been demonstrated in a field trail 20.A factor that could introduce additional, unacceptable latencies is extensive wireless backhaul.For most areas this is not an issues as the proposed network topology largely relies on opticalfibre backhaul.SatelliteAreas that are not covered by FTTH or FWB have to rely on satellite
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Hassan Rajaei, Bowling Green State University; Eman A. Aldakheel, Bowling Green State University
Tagged Divisions
Computing & Information Technology
  educational  community.  This  paper  examines  how  specific Computer Science courses can be mapped to certain layer(s) of the Cloud (see Sections 4 & 5). Rapid  growth  of  the  cloud  technology  and  promises  to  reduce  the  IT  costs 5  pushed  numerous educational institutions to revise their IT infrastructure and follow the Cloud development. Our university, like many others, is moving to the Cloud within the next five to ten years. Computer Sciences and STEM Education are among prime targets. Ever  since  the  emergence  of  Cloud  Computing,  significant  emphasis  and  efforts  have  been offered in exploring and defining this new technology 4, 7, 8, 9 . Experts predict that by 2020 most institutions  and  enterprises  will  move  to
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
underway.Bibliography1. Ayala, K. J. (1997). The 8051 Microcontroller: Architecture, Programming and Applications (2 ed.): West.2. Barnett, R., Cox, S., & O'Cull, L. (2003). Embedded C Programming and the Atmel AVR: Thomson, Delmar Learning.3. Barnett, R., Cox, S., & O'Cull, L. (2004). Embedded C Programming and the Microchip PIC: Thomson, Delmar Learning.4. Cady, F. M. (2008). Software and Hardware Engineering: Assembly and C Programming for then Freescale HS12 Microcontroller.5. Gaonkar, R. S. (2007). Fundamentals of Microcontrollers and Applications in Embedded Systems with the PIC18 Microcontroller Family): Thomson Delmar Learning.6. Peatman, J. B. (2003). Embedded Design with the PIC18F452
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alak Bandyopadhyay, Alabama A&M University; Neema Simon Sumari, Alabama A&M University
Tagged Divisions
Computing & Information Technology
square meter movable solar cells panel mountedso that it was perpendicular to the Sun’s position through out the day. The fixed solar panel wasperpendicular to the Sun’s position only when the Sun was directly overhead.Two simulated locations for the experiment were selected, Morogoro, Tanzania and Huntsville,Alabama. Morogoro has a latitude of 6° 49′ 0″ S and a longitude of 37° 40′ 0″ E which is nearthe Equator. Huntsville, Alabama has a latitude of 34° 43′ 49″ N and a longitude of 86° 35′ 10″W and is located in the middle part of the Northern Hemisphere of the Earth.The four dates selected for the simulation were the Vernal Equinox March 20, 2011, SummerSolstice June 21, 2011, Autumnal Equinox September 23, 2011, and the Winter
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Song Xing, California State University, Los Angeles; Wang Wei, Southeast University
Tagged Divisions
Computing & Information Technology
leastwe could identify the course title, instructor(s) of the course, and a list of main topics of thecourse. Most of the sites contain much richer contents than the aforementioned minimum amountof information. Among the additional information found on these sites include teachingschedules, topics discussed in the course, lecture notes, detailed homework and projectassignments, and any combinations of the above. In the end, information from a total of 38course websites is collected. Twenty-eight courses of the 38 total have been taught since 2007 (afive-year window through spring 2012). A list of these 28 course websites is in Appendix A.4. Course Titles, Goals, and ObjectivesCollectively the following different course titles are used in the
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
integrate wireless sensor networks concepts into their curriculum.IntroductionA wireless sensor network (WSN) is a network of a set of independent small nodes equippedwith sensor(s), a wireless radio, a battery, and an on-board processor. Usually, the unit thatconsists of the wireless radio and the on-board processor is called a mote. With the recentadvances in MEMS technology, wireless communications, and digital electronics, the design anddevelopment of low-cost, low power, multifunctional sensor nodes that are small in size andcommunicate untethered in short distances have become feasible. The ever-increasingcapabilities of these tiny sensor nodes, which include sensing, data processing, andcommunicating, enable the realization of wireless
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Frank Jordan Sheen, Brigham Young University; Dale C. Rowe Ph.D., Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
span continents[4].The management of SCADA systems was consolidated using personal computers to monitorprocesses by making requests for information from embedded devices commonly known asprogrammable logic controllers (PLCs). However, as SCADA systems began to integrate withpersonal computers, they were exposed to outside volatile networks, bypassing the common“security by obscurity” philosophy [5, 6].Several instances occurred in the early 2000’s that raised concern about the security of SCADA Page 25.877.2environments[7]. In 2003, the Slammer Worm infected the David-Besse nuclear power plant inOhio. Although the facility was undergoing
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Naser El-Bathy P.E., North Carolina A&T State University; Clay Samuel Gloster Jr., North Carolina A&T State University; Ghassan M. Azar; Cameron Seay, North Carolina A&T State Univeristy; Mohammed K. El-Bathy, Lawrence Technological University; Ibraheem A. Kateeb, North Carolina A&T State University; Rajeev K. Agrawal, North Carolina A&T State University; Aiman Ghassan Baset
Tagged Divisions
Computing & Information Technology
, Massachusetts: Jones and Bartlett Publishers, 2008.[19] N. Chaiyarataiia, A. M. S . Zalzala. Recent developments in evolutionary and genetic algorithms: theory and Page 25.1012.15 applications. Genetic Algorithms in Engineering Systems: Innovations and Applications. GALESIA 97. Second International Conference On (Conf. Publ. No. 446), pp. 270 – 277, 1997.[20] D. E. Rowley, D. G. Rhoades. The cognitive jogthrough: a fast-paced user interface evaluation procedure. CHI '92 Proceedings of the SIGCHI conference on Human factors in computing systems, ACM, New York, 1992.[21] D. Pinelle, C. Gutwin. Groupware
Conference Session
Emerging Information Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Erin Shaw, University of Southern California; Michael Crowley, University of Southern California; Jaebong Yoo, University of Southern California; Hao Xu, University of Southern California; Jihie Kim, University of Southern California
Tagged Divisions
Computing & Information Technology
., Laity, A., Jacob, J. C., and D. S. Katz (2005). Pegasus: a Framework for Mapping Complex Scientific Workflows onto Distributed Systems, Scientific Programming Journal, Vol 13(3), (2005). 2. Ma, J., Kang, J.-H., Shaw, E. and Kim, J. (2011), Workflow-Based Assessment of Student Online Activities with Topic and Dialogue Role Classification , Proceedings of the AI in Education Conference, 2011. 3. Ma, J., Shaw, E. and Kim, J. (2010) Computational Workflows for Assessing Student Learning, The 10th International Conference on Intelligent Tutoring Systems Conference, 2010. 4. Xu, H., Shaw, E. and Kim, J. (in process) Workflow reporting and feedback system for formative assessment of online course
Conference Session
Emerging Information Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Robert E. Efimba P.E., Howard University; Tori Rhoulac Smith, Howard University
Tagged Divisions
Computing & Information Technology
, Wiley. 9. Palm, W.J (2001), Introduction to Matlab 6 for Engineers, McGraw-Hill. 10. Wieder, S.(1992), Introduction to MathCAD for Scientists and Engineers, McGraw-Hill. 11. Bedford, A., and W. Fowler (2008), Engineering Mechanics: Statics, 5th ed., Pearson/Prentice-Hall. 12. Beer, F.P., and E.R.Johnston (2007), Vector Mechanics for Engineers: Statics, 8th ed., McGraw-Hill. 13. Efimba, R.E. (2012), “The Joy of Mechanics I: Statics,” 4th ed., Department of Civil and Environmental Engineering, Howard University, Washington, DC., 250 pp. 14. Efimba, R.E. (2012), “The Joy of Mechanics III: Mechanics of Materials,” 3 rd ed., Department of Civil and Environmental Engineering, Howard University, Washington, DC
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; James R. Lewis, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
://www.e-booksdirectory.com/details.php?ebook=38326. Kochan, S. G., Programming in Objective-C, Addison-Wesley, August 2011.7. Green, D., Android vs iPhone Development: A Comparison.html, July 2009, http://greensopinion.blogspot.com/2009/07/android-versus-iphone-development.html8. Cocoa Developers Guide, Apple Developer Publications, December 2010, http://itunes.apple.com/us/book/cocoa-fundamentals-guide/id409921412?mt=119. Deitel, H.M., Deitel, P.J., Java How to program, Prentice Hall, 200310. Android Developer Resources, Tutorials, http://developer.android.com/index.html.11. iOS App Programming Guide, iOS Developer Library, http://developer.apple.com/devcenter/ios/gettingstarted/docs/objectivecprimer.action
Conference Session
Emerging Information Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Lakshmi Ramachandran, North Carolina State University; Edward F. Gehringer, North Carolina State University
Tagged Divisions
Computing & Information Technology
Mining,2008, pp. 192– 196.[2] E. F. Gehringer, L. M. Ehresman, and W. P. Conger, S.G., “Reusable learning objects throughpeer review: The Expertiza approach,” in Innovate: Journal of On- line Education, 2007.[3] E. F. Gehringer, “Expertiza: information management for collaborative learning,” in InMonitoring and As- sessment in Online Collaborative Environments: Emergent ComputationalTechnologies for E-Learning Support. IGI Global Press, 2009.[4] F. P. W. Landauer, T. K. and D. Laham. An introduction to latent semantic analysis. InDiscourse Processes. Special Issue on Quantitative Approaches to Semantic KnowledgeRepresentations, 259–284. Volume 25. 1998.[5] T. A. S. Pardo, L. H. M. Rino and Maria das Graças Volpe Nunes, “Extractive
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Michael Hergenrader, University of Southern California; Jihie Kim, University of Southern California; Erin Shaw, University of Southern California
Tagged Divisions
Computing & Information Technology
contrast to the peers that did not become involved.1 http://news.stanford.edu/news/2011/august/online-computer-science-081611.html2 http://ocw.mit.edu/index.htm3 Kim, J., Kim, T., Li, J., Shaw, E., and Wyner, S. (2010). Discerning Affect in Student Discussions. Annual Meeting of the Cognitive Science Society, 2010.4 Cole, M., and Engeström, Y. (1993). A cultural-historical approach to distributed cognition. In G. Salomon (Ed.), Distributed cognitions: Psychological and educational considerations. New York: Cambridge University Press.4 Engeström, Y. (1987). Learning by Expanding: An Activity Theoretical Approach to Developmental Research. Helsinki: Orienta-Konsultit Oy.4 Lave, J. (1996) Teaching as Learning, in