Asee peer logo
Displaying all 25 results
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
John (Lalit) Jagtiani, University of Bridgeport; Neal A Lewis, University of Bridgeport
Tagged Divisions
Computing & Information Technology
Paper ID #17202Enhancing Software Engineering Curricula By Incorporating Open, Data-Driven Planning MethodsMr. John (Lalit) Jagtiani, University of Bridgeport Mr. Lalit (John) Jagtiani is currently a Ph.D. candidate focused on Technology Management at the Uni- versity of Bridgeport, School of Engineering. His research interests include software technology manage- ment, software metrics, technology change management, and technology risk management. Mr.Jagtiani has 25+ years of industry experience with technology management and strategic business solutions. He currently serves as a consultant to several organizations and
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yung-Hsiang Lu, Purdue University; Thomas J. Hacker, Purdue University, West Lafayette; Carla B. Zoltowski, Purdue University, West Lafayette; Jan P. Allebach, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
skills are essential for career development. However, in typicaluniversity settings, undergraduate students take different courses and work on different projects indifferent teams each semester. As a result, students lack opportunities to work on multi-yearprojects and develop the skills essential for long-term planning. To remedy this situation, ourdepartment has created elective courses that allow students from all years (first-year students tograduate students) to work on research projects under the supervision of faculty members and thementorship of senior graduate students. These projects provide the opportunities for students tolearn many skills essential in workplace, such as (1) understanding how projects are designed andmanaged; (2
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
program at UVU or a two years Pre-Engineering program at UVU with the plan to transfer into an Engineering four-year program. 3) Demonstration of financial need in accordance with the U.S. Department of Education rules for Federal financial aid. 4) Full-time student majoring in Computer Science, Computer Engineering, Software Engineering, or Pre-engineering6.Student AgreementThe selected students will commit to progressing in their major by signing a contract between thestudent and the institution/department. This contract will set out their requirements to accomplishthe following6: 1) Maintain a grade point average of at least 3.0 in all classes taken. 2) Meet with their
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, Florida Institute of Technology; Khalil A. Said
Tagged Divisions
Computing & Information Technology
competitive advantage and achieving of their goals and objectives if the righta prescribed process model is adopted to complement IT strategic alignment plans foreffective IT organizations. This study is significant to organizations by drawing on pervasiveand chronic problems organizations face to align business and IT. The results of views of ITprofessionals, their feelings of strategic alignment and adopting ITIL v3 were positive; thestatistical data are discussed in data analysis section of this paper. The study was significant for the executives and IT professional to consider andimplement a prescribed process model to integrate key business related process within the ITprocess. The result of the survey shows implementing and adopting ITIL
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Alireza Farahani; Mudasser Fraz Wyne, National University; Lu Zhang, National University
Tagged Divisions
Computing & Information Technology
address a particular course learning outcomethat in turn is linked to a program learning outcome. This practice is often used toevaluate the effectiveness of a course as well as to identify any need for coursemodifications and improvements. When assessment is in the form of a test, then theadministration, collection and the final aggregate report generation becomes a timesconsuming task that often introduces delays in planning. In this paper we present a web-based software tool that is primarily designed and developed for automating the courseassessment process. It automates the test creation, grading and the final reportgeneration that can help save time, reduce errors and produce variety of reportsummaries for better decision making.1
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Samuel Moses, Brigham Young University; Nathaniel Scott Baker; Dale C. Rowe, Brigham Young University
Tagged Divisions
Computing & Information Technology
a year before transferring to BYU. Nate has taken a wide variety of courses, ranging from chemistry to business to computer engineering, and plans on graduating with a degree in Information Technology in 2016. He has recently discovered an interest in cyber security, and started working as a research assistant in the CSRL in order to begin developing his skills. In his free time, Nate enjoys playing guitar, snowboarding, and theater.Dr. Dale C. Rowe, Brigham Young University Dr. Rowe has worked for nearly two decades in security and network architecture with a variety of in- dustries in international companies. He has provided secure enterprise architecture on both military and commercial satellite communications
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mahmoud K. Quweider, University of Texas - Rio Grande Valley; Fitratullah Khan, University of Texas - Rio Grande Valley
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Excellence in STEM at The University ofTexas Pan-AM as part of a grant funded by the US department of Defense. The 2-day workshopaimed at presenting hands-on experience on designing effective instruction. The first part of theworkshop emphasized the 5-stage/task backwards design (modified framework from Wiggins &McTighe, Understanding by Design,1999) used to guide the content modules for the courses thatwill use the CBI modules [6] . The model is shown in Figure 1. We were asked to keep in mindthe following general objectives to emulate as we went through the 5-tasks planning stage:  Promote conducting fundamental research on learning and instruction  research issues and opportunities related to designing learning environments that
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Jinyi Zhang, Purdue University; Pan Fengjian, Purdue University, West Lafayette; Mrigank S. Jha, Purdue University, West Lafayette; Pranav Marla, Purdue University; Kee Wook Lee, Purdue University; David B Nelson, Purdue University, West Lafayette; Yung-Hsiang Lu, Purdue University
Tagged Divisions
Computing & Information Technology
  order  to  prevent  academic dishonesty.  Our  system  currently  supports  C  programs  and  we  plan  to  extend  it  to  other languages  in  the  near   future.  The  execution  engine  is  a  Docker  container.  The  system automatically  generates  ​ Makefileto     compile  and  link  the  source  code.  When  a  program  is tested,  the  system  invokes  a  set  of  analysis  programs,  for example, ​ Valgrindto    detect invalid memory  access. If a program terminates abnormally, the system invokes ​ gdband   reports the call stack  information.  The  system  also   allows  modular  testing.  An  instructor  provides  the  correct answers  for  the  functions  needed  for  a  programming  assignment.  After  a  student
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mark Sherriff, University of Virginia; Mark Floryan, University of Virginia
Tagged Divisions
Computing & Information Technology
opportunities for VP outside of class.”  “The VP system was effective at encouraging class discussion. In my opinion, the system can be improved by adding a counter that shows the points needed to advance to the next level.”4.3 Quests and GamerCardStudents were generally positive regarding the use of quests as assignments and how they weredisplayed on GamerCard. Students reported that having all assignments for the semesteravailable in one list on GamerCard was a good resource and allowed them to plan out theirefforts during the semester.4.4 Achievements/Titles/ClassesIn comparing GamerCard to other gamification systems (such as Fitocracy [8] or even karmarating systems for online discussion cites such as Reddit), the almost unified opinion that
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afrin Naz, West Virginia University Inst. of Tech.
Tagged Divisions
Computing & Information Technology
sophomore level. Our major renovation to this class is engaging students in asemester-long group project, which includes formal presentations, research, team work andmultiple active learning exercises. The semester-long group project consists of four phases:communication and planning, modeling, construction, and deployment. Through the four phases,students gradually gain communication, ethics, and teamwork professional skills. Comparisonamong data collected from the four phases show significant improvements of the students’professional skills, particularly presentation skills and teamwork skills.ABET student outcomes and performance indicators ABET student outcomes describe what students are expected to know and be able to do by thetime of
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Joshua Levi Weese, Kansas State University; Russell Feldhausen, Kansas State University; Nathan H. Bean
Tagged Divisions
Computing & Information Technology
more complex AI, such as neural networks, can be trained.After completing that activity, the students were introduced to the final project: building an AIfor an autonomous Mars rover. The concept was first shown to them as a game, where theywere challenged to get the highest score possible. This required planning ahead to find the bestpath and learning how the rover operates. These activities drew on many areas of CT, includingmodeling and simulation, abstraction, and data representation. On the fourth day, the rover was re-introduced as a game, but this time the rover couldonly see the squares immediately adjacent to it. This required students to “sense” theirsurroundings and act based on limited information, just as the rover would
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Md Hossain Shuvo, Alabama A&M University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
system. Successive steps have been followed for the testing of Robot Control System. The fundamental architecture for the overall testing procedure for Robot Control System is depicted in Fig 8. Fig 8: System testing procedure © American Society for Engineering Education, 2016 2016 ASEE Southeast Section ConferenceTherefore, the entire test procedure is carried out based on the planning, designing,implementation and evaluation.i. Test Case GenerationAn apprize
Conference Session
Computing & Information Technology Division Poster Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
John Martin, Youngstown State University; Anna M. Martin, Kent State University
Tagged Divisions
Computing & Information Technology
verylimited amount of research that examines the simultaneous learning of computer software andengineering concepts. Prior research has identified the benefits of the sequential presentation ofinformation to learners with low-levels of computer-based technology knowledge, while muchless is known about the presentation of computer-based materials to those that are moreexperienced.2,4 Better understanding of the way in which instructional design impacts learners ofvarying levels of expertise has the potential to better guide efficient instructional planning anddelivery.4Design/Methods Given the limited understanding in the literature about learners with advanced technologyskills, we will utilize a quantitative quasi-experimental pretest
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Ali Salehnia, South Dakota State University; Shieva Salehnia
Tagged Divisions
Computing & Information Technology
information and computingprofessional organizations, and non-information system organizations have codes of ethicsspecific to their organizations which emphasize occupational responsibility.To assist with this, describes [2] the following five ethical principles that apply to processinginformation in the workplace, and also provides examples of how they would be applied. 1. Informed consent. Try to make sure that the people affected by a decision are aware of your planned actions and that they either agree with your decision, or disagree but understand your intentions. 2. Higher ethics in the worst case. Think carefully about your possible alternative actions and select the beneficial necessary ones that will cause the least, or
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Sarah A. Cunha; Dale C. Rowe, Brigham Young University
Tagged Divisions
Computing & Information Technology
come to love both offensive and defensive cyber security and is currently planning on pursuing a Masters degree emphasizing Cyber Security.Dr. Dale C. Rowe, Brigham Young University Dr. Rowe has worked for nearly two decades in security and network architecture with a variety of in- dustries in international companies. He has provided secure enterprise architecture on both military and commercial satellite communications systems. He has also advised and trained both national and interna- tional governments on cyber-security. Since joining Brigham Young University in 2010, he has designed a variety of courses on Information Assurance, Cyber Security, Penetration Testing, Cyber Forensics and Systems Administration and
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; John B. Southworth, East Carolina University
Tagged Divisions
Computing & Information Technology
generation IP protocol. Wemeasure IPv6 adoption through eight adoption metrics gleaned from eleven datasets. Datacollection covers a two year period from January 2014 through December 2015.In addition, we address the implications of the sudden uptick in IPv6 adoption, as it continues ona path of accelerated expansion. The long awaited transition from IPv4 to IPv6 has implicationsfor all organizations who will soon be making the change; many of which may not be preparedfor how to systematically approach such an undertaking. Factors such as project planning, IPv6saturation, infrastructure assessment, policy redesign, and network continuity are discussed askey areas that will need to be addressed as organizations begin to adopt IPv6.Key words: IPv6
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Stephany Coffman-Wolph, West Virginia University Institute of Technology
Tagged Divisions
Computing & Information Technology
10. (Optional) Discuss possible ways to re-arrange the network to avoid black or gray hats. Have the students re-arrange the network topology. Repeat message passing Suggestions:  If you do not want to use candy, then try stickers, smaller erasers, or other small party favor.  The hats can be of any type (paper, plastic, felt, etc.) and they do not all have to be the same (as computer networks have all kinds of nodes on them)  You should plan for as many hats as you want students to participate (and generally I have everyone participate) and (minimally) 2/3 of the hats should be white
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
for beginners, yet flexible enough for advanced users to take advantage of as well. • Open source and extensible software - The Arduino software is published as open source tool, available for extension by experienced programmers. The language can be expanded through C++ libraries, and people wanting to understand the technical details can make the jump from Arduino to the AVR C programming language on which it's based on. Similarly, you can add AVR-C code directly into your Arduino programs. • Open source and extensible hardware - The plans of the Arduino boards are published under a Creative Commons Attribution Share – Alike license, so experienced circuit designers can make their own
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Te-shun Chou, East Carolina University; Steve Keith Baker, East Carolina University; Miguel Vega-Herrera
Tagged Divisions
Computing & Information Technology
activities can also automate gradingroutines and facilitates unique testing environments with variable content generation [3]. This isa powerful tool that enables the instructor to create unique assignments, and facilitates for quickand efficient grading of complex configurations.3. ConclusionsInstead of having to choose using either PT or GNS3 for network development, it might be aneven better idea to use them both together. As previously discussed, both programs target distinctaspects of an overall project, and can be used to complement each other. PT can be used to createa networking plan that incorporates the internal and external functions of a network. PT couldfurther facilitate ease of assessment and automated grading. GNS3, on the other hand
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Sanjit K. Mitra, University of California - Santa Barbara; Woon-Seng Gan, Nanyang Technological University; Phyo Ko Ko, Nanyang Technological University; Hai Nguyen Duy, Nanyang Technological University
Tagged Divisions
Computing & Information Technology
. Figure 8: Survey Results.Future WorkCurrently, the review modules on Mathematics of Engineering and Microprocessor are beingclass-tested in their respective undergraduate courses at the School of Electrical and ElectronicEngineering, Nanyang Technological University, Singapore.The next phase of the development of OnTEn website is to add more engineering contents. Tothis end, we have visited a number of universities in several countries and plan to continue thevisits to several other universities. The universities visited so far are the University of SouthernCalifornia, Los Angeles, California (USA); University of California, Davis, California (USA);California State University, Northridge, California (USA); Chinese University of Hong Kong(Hong
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mayari I. Serrano, Purdue University, West Lafayette; Alejandra J. Magana, Purdue University, West Lafayette; Baijian Yang, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
introduce students to the problem.It has to be written in a way that leads students to define the problem by themselves. Thestudents must then generate a plan of action that has to be followed to meet the client’srequirements. The problem-solving process obliges the team to go through numerous iterations,and test and review solutions in order to come up with a model that will address the client needs[10] . Similarly, teamwork is essential in MEAs due to the time available to come up with a viablesolution to the problem. Additionally, by requiring multiple point-of-views and perspectives,students can arrive to better solutions in less time [10].A Cybersecurity Themed Model-Eliciting ActivityThis paper presents an MEA called Migration to HTTPS
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Danilo Garbi Zutin, Carinthia University of Applied Sciences; Michael E. Auer, Carinthia University of Applied Sciences
Tagged Divisions
Computing & Information Technology
. We have been studying the possibilities and themost suitable technologies available to implement this. A potential candidate areWebSockets13, as described in RFC 6455 due to the support for a bidirectional full-duplexcommunication channel that could be used to convey messages to the experiment engines7.We would like to highlight that the solution presented by this work is a tool for laboratorydevelopers or laboratory owners that plan to or already host online laboratories. Thesestakeholders are usually specialists on the lab domain and not software engineers. The toolspresented here are, however, transparent for other stakeholders such as students, instructorsand teachers. It is not the focus of this work to provide any guidelines or
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, Florida Institute of Technology; Mohd Abdelgadir Khairi, Najran University; Jinan Ziade
Tagged Divisions
Computing & Information Technology
Multiple-Entity types such as customers, accounts, products, and vendors;2) User types and usage scenarios such as analysis and reporting; 3) Data governance andadministration features and capabilities; 4) Support for unstructured data and search capabilitiesfor it at enterprise level; 5) Support Centralized or decentralized repositories; 6) Ease to deploy;and 7) Pre-built Domain Data Model. Security and privacy considerations: Security and privacy are crucial in MDMarchitecture and one must take security considerations into account in MDM implementation.Dreibelbis [3] discussed the considerations of security related in MDM implementation: First,Policy is part of general data governance plan. The privacy and security policies are the rules
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology; Reneta Davina Lansiquot, New York City College of Technology
Tagged Divisions
Computing & Information Technology
. Wankel & R. Hinrichs (Eds.), Transforming virtual learning: Cutting-edge technologies in higher education (Vol. 4, pp. 311- 331). Bingley, UK: Emerald.[12] Lansiquot, R., & Cabo, C. (2010). The narrative of computing. In Proceedings of World Conference on Educational Media and Technology 2010 (pp. 3655-3660). Chesapeake, VA: AACE.[13] Lansiquot, R. D., Satyanarayana, A., & Cabo, C. (2014). Using interdisciplinary game-based learning to develop problem solving and writing skills. In Proceedings of the 121st ASEE Annual Conference. Washington, DC: ASEE.[14] Rist, R. S. (1995). Program structure and design. Cognitive Science, 19, 507-562.[15] Spohrer, J. C., Soloway, E., & Pope, E. (1989). A goal/plan analysis of
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University; Nelson Barnes Jr, Alabama A&M University
Tagged Divisions
Computing & Information Technology
Yes Testing def and uses and how to perform all uses testing. LO#7. All Def- Give an introduction to the definition of 7 5 No Uses path testing def and uses and how to perform all uses testing. LO#8. Statement Give an introduction to the definition of 5 5 No Coverage coverage. Others Mobile app testing techniques and tools 10 10 No (Android and iOS). Proceedings of the 2016 ASEE Annual Conference Other than the developed learning objects (LOs) and those being developed, shown inTable 1, we plan to develop more learning