Paper ID #22725Work in Progress: Designing Laboratory Work for a Novel Embedded AICourseDr. Mehmet Ergezer, Wentworth Institute of Technology Mehmet Ergezer (S’06) received the B.S. and M.S. degrees in electrical and computer engineering from Youngstown State University, Youngstown, OH, USA, in 2003 and 2006, respectively. He received the D.Eng. degree in artificial intelligence from the Department of Electrical and Computer Engineering, Cleveland State University, Cleveland, OH, USA, in May 2014. From 2003 to 2005, following his internship with U.S. Steel, he was a Graduate Assistant with Youngstown State University. In
Paper ID #22542Virtual Reality Implementation of a Scanning Electron Microscope in Nan-otechnology EducationLandon A. Braden Landon is an electrical engineering student at Utah Valley University. As a member of UVU’s nan- otechnology team, he writes lesson material and participates in experiments involving nanotechnology fabrication. He is also an amateur inventor.Scott Alexander Kaiser, Utah Valley University Scott is an undergraduate physics student at Utah Valley University. He is working as a research student to develop laboratory experiments for an associate level nanotechnology program.Dr. Reza Kamali-Sarvestani, Utah
University. During the course of our studies, several students(graduate and undergraduate) worked under the supervision of faculty members to understand theforensic aspects of real world attacks on SCADA hardware as well as the network used by thesystem. This new laboratory is intended to be used for Computer Science, Digital and CyberForensic Engineering Technology, and Engineering Technology programs at our university. Withthe availability of this laboratory we have a realistic SCADA/ICS system which can be used tostudy real-life experiments such as penetration assessment and testing, vulnerability assessmentand testing, and the SCADA forensics research. In addition to aforementioned research activities,the laboratory will also serve to develop
the role of these centers in promoting a cybersecurity culture and advancing thecybersecurity education process in these universities. The output of the survey shows that thefollowing cybersecurity centers are available to support the offered programs in the tenuniversities: 1. Purdue University; Center for Education and Research in Information Assurance and Security (CERIAS) [11]. 2. Georgia institute of technology; Institute for Information Security & Privacy (IISP) [12]. 3. University of Washington; Security and Privacy Research Laboratory (SPRL) [13] & Tech Policy Lab (TPL) interdisciplinary lab [14]. 4. University of Maryland; Maryland Cybersecurity Center (MC2) [15]. 5. University of Illinois at Urbana
valuable addition tothe electrical engineering curriculum.We argue that the reasons behind the technical choices, their impact on the resource consumptionand the performance versus flexibility tradeoffs are relevant for cellular communicationsstandards education. Moreover, project management, team work, development of realisticexpectations and practical solutions are skills that are much demanded by industry in addition todomain-specific technical specialization. We therefore propose a methodology for teachingstandards that creates favorable conditions for developing those skills.The combination of lecture-centered education [2] with laboratory-centered approaches [3], [4],has been adopted in the engineering curriculum when the Conceive, Design
webbrowser may be the client, and an application on a computer that hosts a website may be theserver. HTTP GET requests focus on requesting data from a server and the server providing therequested data back to the client. HTTP POST requests usually involve a client providing data toa server and the server uploading or storing that information [12].3.2 IoT Emulation through VirtualizationTo adequately measure the effects of available resources (CPU, RAM, and networkingcapability) on IoT botnets, we architected an IoT emulation environment utilizing virtualizationtechniques. Fig. 1 below outlines the high-level topology of our emulation laboratory. The goalof this emulation environment was to remove as many variables as possible and to focus on
support staff, enabling issues to be addressed before being reported by endusers.KeywordsUndergraduate laboratories, undergraduate projects, user experience, network analytics, K-12schools, technology management, cloud services, performance monitoring© American Society for Engineering Education, 2018 2018 ASEE National ConferenceProblem statementK -12 schools across the nation are moving the resources that their information technologydepartments once provided locally, to Cloud Services offered by many different providers [1],[2], [3]. A 2013 study by the Fordham University, Center for Law and Information Policy,conducted a nationwide survey of school districts to determine the prevalence of cloud servicesin the
13 Semester Project Report 14 Lab Final (No lab assignment) 3.4 Lab Environment The DS course uses one of the dedicated CNSA laboratories for its lab assignments. The lab contains 22 desktop workstations. All workstations are updated Dell OptiPlex server with 2G RAM. There is also a server farm mounted on a computer rack with another 20 workstations, which is used in other courses. We utilize Virtual Machines (VMWare [6] and VirtualBox [8]) to set up a lab environment for students. Each of the 22 host machines runs VMWare Server, and students do all of their work in virtual machines. Figure 2 shows lab setup. There is a virtual test bed with
the program. There must be a suf- ficient number of faculty and they must have sufficient responsibility and authority to improve and implement the program.7. Facilities All facilities (classrooms, offices, laboratories, and associated equipment) must be adequate to support the attainment of the student outcomes. Modern tools, equip- ment and resources must be available to the students, and they must be systemati- cally maintained and upgraded.8. Institutional Institutional support and leadership must be adequate to ensure the continuity of the Support program. Institutional resources provided to the program must be
National Laboratory). He holds three USPTO patents (IP of Cisco Systems). In addition to a doctorate in Computer Science, Predrag Tosic holds three master’s degrees, two in math- ematical sciences and one in CS. Tosic has a considerable teaching and student research mentoring expe- rience. He has enjoyed working with students of a broad variety of ethnic, cultural and socio-economic backgrounds and at different types of academic institutions. He has been actively involved with IEEE – the Palouse Section and is currently President of the Section’s Computer Society. He is also an active member of ACM, ASEE and AMS.Dr. Julie Beeston, University of Idaho Dr. Julie Beeston has both a Master’s degree (from Carleton University
government research lab (Los Alamos National Laboratory). He holds three USPTO patents (IP of Cisco Systems). In addition to a doctorate in Computer Science, Predrag Tosic holds three master’s degrees, two in math- ematical sciences and one in CS. Tosic has a considerable teaching and student research mentoring expe- rience. He has enjoyed working with students of a broad variety of ethnic, cultural and socio-economic backgrounds and at different types of academic institutions. He has been actively involved with IEEE – the Palouse Section and is currently President of the Section’s Computer Society. He is also an active member of ACM, ASEE and AMS.Dr. Julie Beeston, University of Idaho Dr. Julie Beeston has both a