Asee peer logo
Displaying all 10 results
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Tokunbo Ogunfunmi, Santa Clara University
Tagged Divisions
Computing & Information Technology
provide examples of the curriculum,what is covered and how we cover it. We also provide examples of laboratory projectsthat are used to complement the class lecture sessions. We use MATLAB software in allthe lab projects.We also discuss possible implementations of the speech coding and processing usinghardware such as DSPs. In the future, we plan to introduce the use of FPGAs for thisapplication as well.Details of the course and our experiences in developing and offering them will bepresented at the conference.IntroductionPreviously, we have developed three graduate-level courses in the Multimedia area ofSpeech to teach the fundamentals of speech coding and voice-over-IP. They are a 3-course sequence (1) ELEN 421 (Speech Coding I) (2) ELEN 422
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Hassan Rajaei, Bowling Green State University; Eman A. Aldakheel, Bowling Green State University
Tagged Divisions
Computing & Information Technology
  extensively  benefit  from  CBE  at  the  Software  as  a  Service (SaaS)  level  to  present  meaningful  examples  in  the  lectures,  CS  courses  can  move  deeper  and utilize also the lower levels of cloud services. Such capability can deliver valuable examples and laboratories for CS students to better understand large scale applications and their complexities. 1.  Introduction The accelerated development in Information Technology and the necessity for enhanced learning environments  by  harnessing  advance  technologies  and  resources  has  created  a  need  to  teach Computer  Science  and  Engineering  students  more  effectively  using  technological  advances. Cloud Computing 1, 2, 3, 4, 5,7  appears to be one of the most beneficial
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
WSN Course at Portland State UniversityIn the Computer Science Department at Portland State University, they introduced an in-classlaboratory component to their undergraduate sensor networks course that had previously beenentirely lecture-based. For the laboratory exercises, they used Sun’s Java-programmable SunSPOT sensor network technology. They found that their first hands-on laboratory-basedundergraduate-accessible wireless sensor networks course to be a success. They feel that thegentler learning curve of the SPOTs was a necessity for developing labs that reinforce important Page 25.823.3concepts from the lecture, and this would have been
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Jason St. John, Purdue University, West Lafayette; Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
infeasible for agraduate course. System administrators can install clusters without the use of automated tools(manually), which is a very tedious task even when other tools are used to help automate theprocess. As an alternative, system administrators can use a cluster kit to assist in hostoperating system installation via PXE booting to configuring the package selection andnetworking for the cluster hosts. The three most notable cluster kits are: OSCAR (Open SourceCluster Application Resources) 5 , the Rocks Cluster Distribution ("Rocks") 11 , and thenow-defunct openMosix project 13 .OSCAR is a cluster kit developed primarily by Oak Ridge National Laboratory (ORNL) and isa community-driven open-source software project. OSCAR version 1.0 was
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
systems are accessible through remote web pages. Locally networked systems, such asZigbee systems, often include a bridge to wider network and Internet systems. SCADA systemsare networked and interlinked. This exposure of systems to the outside world creates additionaldesign issues for embedded systems designers. There have been numerous reports of embeddedsystems being compromised by external penetration attempts through these communicationchannels. For example laboratory demonstrations of attacks on car electronic systems throughapparently innocuous means, such as their tire pressure sensors [15], and through cellular linksproviding demonstrated access to car brakes, acceleration and other systems [16], which could belife-threatening. While
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Frank Jordan Sheen, Brigham Young University; Dale C. Rowe Ph.D., Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
AC 2012-3612: LARGE SCALE, REAL-TIME SYSTEMS SECURITY ANAL-YSIS IN HIGHER EDUCATIONJordan Sheen, Brigham Young University Jordan Sheen is a graduate student in the School of Technology at Brigham Young University (BYU). Sheen completed a B.S in information technology at BYU in 2011, where his main interests were in cyber security and embedded systems. In his graduate program, Sheen will focus on the security of critical infrastructure components. In his spare time, Sheen enjoys walking with his wife, wrestling with his three sons, and cooing for his infant daughter.Dr. Dale C. Rowe Ph.D., Brigham Young University Dale Rowe’s is an asst. professor of IT and a director of the Cyber Security Research Laboratory. His
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alak Bandyopadhyay, Alabama A&M University; Neema Simon Sumari, Alabama A&M University
Tagged Divisions
Computing & Information Technology
solar cells by changing position of solar panels and software development forencryption and decryption of data that enables data transfer securely via internet.There has been lot of work published in the area of solar tracking and some of them arediscussed in this section. Work by Chong et al.2 found that by using a Sun-tracking formula, theywere able to track the Sun’s position accurately and it was cost effective. They also found thatwhile using light sensors (a closed loop system) gave a much better tracking accuracy, thesystem will lose its position if the Sun is blocked by clouds. There conclusion was that a Sun-tracking formula overall gave a significant improvement in the tracking accuracy.The National Renewable Energy Laboratory (NREL
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alexander A. Kist, University of Southern Queensland
Tagged Divisions
Computing & Information Technology
] Access downlink bandwidth [bit/s]Figure 1: Download time (course web page) Figure 2: Download time (lecture recording) versusversus access bandwidth. access bandwidth.The second set of results introduce objective performance measures and subjective userperceived performance for a Remote Access Laboratory activity that involves writing and testinga short script that controls a hardware relay. Details of the experiments are outside the scope ofthis paper and are discuss in another article.6 Figure 3 depicts the Mean Opinion Score of testsubjects (excellent = 5; good = 4; fair = 3; poor = 2; bad = 1) versus RTT. Figure 4 depictsrelative task duration versus RTT, for the same
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; James R. Lewis, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
, buttranslating that idea into actions requires planning. So before you can write any code, you haveto take the time to explore the possible techniques and technologies. The core infrastructure of aniOS app is built from objects in the UIKit framework. There are some resources that must bepresent in all iOS apps. Most apps include images, sounds, and other types of resources forpresenting the app’s content, but the App store may also require some specific resources. Youmay like to refer to iOS App Programming Guide 11 for further details.ResultsSo far we have used this series of modular smart phone laboratory exercises only on two sets ofstudents. The first experimental set of students have given us some limited feedback. Overall thestudent critique was
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Song Xing, California State University, Los Angeles; Wang Wei, Southeast University
Tagged Divisions
Computing & Information Technology
in electrical and computer engineering from George Mason University, Va., in 2003. From 1985 to 1995, he was a lecturer in the Radio Engineering Depart- ment at Southeast University, China. He was also a researcher at the National Mobile Communications Research Laboratory, China, from 1990 to 1995. He was a Visiting Researcher in the Electrical and Com- puter Engineering departments at the University of Michigan, Dearborn, from Feb. 1995 to April 1995 and at Boston University from May 1995 to Aug. 1996, respectively. From August 1997 to May 2003, he was an instructor with the Electrical and Computer Engineering Department and a Teaching/Research assistant in the Electrical and Computer Engineering, Computer