Asee peer logo
Displaying all 11 results
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mehmet Ergezer, Wentworth Institute of Technology; Bryon Kucharski, Wentworth Institute of Technology; Aaron Carpenter, Wentworth Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #22725Work in Progress: Designing Laboratory Work for a Novel Embedded AICourseDr. Mehmet Ergezer, Wentworth Institute of Technology Mehmet Ergezer (S’06) received the B.S. and M.S. degrees in electrical and computer engineering from Youngstown State University, Youngstown, OH, USA, in 2003 and 2006, respectively. He received the D.Eng. degree in artificial intelligence from the Department of Electrical and Computer Engineering, Cleveland State University, Cleveland, OH, USA, in May 2014. From 2003 to 2005, following his internship with U.S. Steel, he was a Graduate Assistant with Youngstown State University. In
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Landon A. Braden; Scott Alexander Kaiser, Utah Valley University; Reza Kamali-Sarvestani, Utah Valley University; Afsaneh Minaie, Utah Valley University; Paul Weber, Utah Valley University
Tagged Divisions
Computing and Information Technology
Paper ID #22542Virtual Reality Implementation of a Scanning Electron Microscope in Nan-otechnology EducationLandon A. Braden Landon is an electrical engineering student at Utah Valley University. As a member of UVU’s nan- otechnology team, he writes lesson material and participates in experiments involving nanotechnology fabrication. He is also an amateur inventor.Scott Alexander Kaiser, Utah Valley University Scott is an undergraduate physics student at Utah Valley University. He is working as a research student to develop laboratory experiments for an associate level nanotechnology program.Dr. Reza Kamali-Sarvestani, Utah
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Umit Karabiyik, Sam Houston State University; Naciye Celebi; Faruk Yildiz, Sam Houston State University; James Holekamp, Sam Houston State University; Khaled Rabieh, Sam Houston State University
Tagged Divisions
Computing and Information Technology
University. During the course of our studies, several students(graduate and undergraduate) worked under the supervision of faculty members to understand theforensic aspects of real world attacks on SCADA hardware as well as the network used by thesystem. This new laboratory is intended to be used for Computer Science, Digital and CyberForensic Engineering Technology, and Engineering Technology programs at our university. Withthe availability of this laboratory we have a realistic SCADA/ICS system which can be used tostudy real-life experiments such as penetration assessment and testing, vulnerability assessmentand testing, and the SCADA forensics research. In addition to aforementioned research activities,the laboratory will also serve to develop
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona; Srikanth Venkatesan, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
the role of these centers in promoting a cybersecurity culture and advancing thecybersecurity education process in these universities. The output of the survey shows that thefollowing cybersecurity centers are available to support the offered programs in the tenuniversities: 1. Purdue University; Center for Education and Research in Information Assurance and Security (CERIAS) [11]. 2. Georgia institute of technology; Institute for Information Security & Privacy (IISP) [12]. 3. University of Washington; Security and Privacy Research Laboratory (SPRL) [13] & Tech Policy Lab (TPL) interdisciplinary lab [14]. 4. University of Maryland; Maryland Cybersecurity Center (MC2) [15]. 5. University of Illinois at Urbana
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Vuk Marojevic, Virginia Tech; Antoni Gelonch-Bosch, Universitat Politècnica de Catalunya; Jeffrey Reed, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
valuable addition tothe electrical engineering curriculum.We argue that the reasons behind the technical choices, their impact on the resource consumptionand the performance versus flexibility tradeoffs are relevant for cellular communicationsstandards education. Moreover, project management, team work, development of realisticexpectations and practical solutions are skills that are much demanded by industry in addition todomain-specific technical specialization. We therefore propose a methodology for teachingstandards that creates favorable conditions for developing those skills.The combination of lecture-centered education [2] with laboratory-centered approaches [3], [4],has been adopted in the engineering curriculum when the Conceive, Design
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andrew R. Schmitt, Metropolitan State University; Theresa Chasar, Newell Brands; Mangaya Sivagnanam, Ingersoll Rand; Faisal Kaleem, Metropolitan State University
Tagged Divisions
Computing and Information Technology
webbrowser may be the client, and an application on a computer that hosts a website may be theserver. HTTP GET requests focus on requesting data from a server and the server providing therequested data back to the client. HTTP POST requests usually involve a client providing data toa server and the server uploading or storing that information [12].3.2 IoT Emulation through VirtualizationTo adequately measure the effects of available resources (CPU, RAM, and networkingcapability) on IoT botnets, we architected an IoT emulation environment utilizing virtualizationtechniques. Fig. 1 below outlines the high-level topology of our emulation laboratory. The goalof this emulation environment was to remove as many variables as possible and to focus on
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Dale Drummond, East Carolina University; Philip J. Lunsford II, East Carolina University; Ciprian Popoviciu, Nephos6, Inc.
Tagged Divisions
Computing and Information Technology
support staff, enabling issues to be addressed before being reported by endusers.KeywordsUndergraduate laboratories, undergraduate projects, user experience, network analytics, K-12schools, technology management, cloud services, performance monitoring© American Society for Engineering Education, 2018 2018 ASEE National ConferenceProblem statementK -12 schools across the nation are moving the resources that their information technologydepartments once provided locally, to Cloud Services offered by many different providers [1],[2], [3]. A 2013 study by the Fordham University, Center for Law and Information Policy,conducted a nationwide survey of school districts to determine the prevalence of cloud servicesin the
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University
Tagged Divisions
Computing and Information Technology
13 Semester Project Report 14 Lab Final (No lab assignment) 3.4 Lab Environment The DS course uses one of the dedicated CNSA laboratories for its lab assignments. The lab contains 22 desktop workstations. All workstations are updated Dell OptiPlex server with 2G RAM. There is also a server farm mounted on a computer rack with another 20 workstations, which is used in other courses. We utilize Virtual Machines (VMWare [6] and VirtualBox [8]) to set up a lab environment for students. Each of the 22 host machines runs VMWare Server, and students do all of their work in virtual machines. Figure 2 shows lab setup. There is a virtual test bed with
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Michael Oudshoorn, Northwest Missouri State University; Rajendra K. Raj, Rochester Institute of Technology; Stan Thomas, Wake Forest University; Allen Parrish, United States Naval Academy
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
the program. There must be a suf- ficient number of faculty and they must have sufficient responsibility and authority to improve and implement the program.7. Facilities All facilities (classrooms, offices, laboratories, and associated equipment) must be adequate to support the attainment of the student outcomes. Modern tools, equip- ment and resources must be available to the students, and they must be systemati- cally maintained and upgraded.8. Institutional Institutional support and leadership must be adequate to ensure the continuity of the Support program. Institutional resources provided to the program must be
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
National Laboratory). He holds three USPTO patents (IP of Cisco Systems). In addition to a doctorate in Computer Science, Predrag Tosic holds three master’s degrees, two in math- ematical sciences and one in CS. Tosic has a considerable teaching and student research mentoring expe- rience. He has enjoyed working with students of a broad variety of ethnic, cultural and socio-economic backgrounds and at different types of academic institutions. He has been actively involved with IEEE – the Palouse Section and is currently President of the Section’s Computer Society. He is also an active member of ACM, ASEE and AMS.Dr. Julie Beeston, University of Idaho Dr. Julie Beeston has both a Master’s degree (from Carleton University
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
government research lab (Los Alamos National Laboratory). He holds three USPTO patents (IP of Cisco Systems). In addition to a doctorate in Computer Science, Predrag Tosic holds three master’s degrees, two in math- ematical sciences and one in CS. Tosic has a considerable teaching and student research mentoring expe- rience. He has enjoyed working with students of a broad variety of ethnic, cultural and socio-economic backgrounds and at different types of academic institutions. He has been actively involved with IEEE – the Palouse Section and is currently President of the Section’s Computer Society. He is also an active member of ACM, ASEE and AMS.Dr. Julie Beeston, University of Idaho Dr. Julie Beeston has both a