also serves in the program committees of many international conferences. Dr. Cai received his Ph.D. in Computer Science from University of Colorado at Colorado Springs in 2005. He is a member of IEEE and ACM. c American Society for Engineering Education, 2018 Teaching Directory Services: Topics, Challenges, and ExperiencesABSTRACTDirectory service is used to organize and access information in an electronic directory. It becomes one of the essential network services intoday’s enterprise environment. However, there are not enough discussions on teaching directory services among computing community. Thispaper presents a course on directory
of computer programming teaching methods,” in XXII Central European Conference on Information and Intelligent Systems, pp. 1–6, 2011.[30] M. M. Reek, “A top-down approach to teaching programming,” in ACM SIGCSE Bulletin, vol. 27, pp. 6–9, ACM, 1995.[31] R. Decker and S. Hirshfield, “Top-down teaching: object-oriented programming in cs 1,” in ACM SIGCSE Bulletin, vol. 25, pp. 270–273, ACM, 1993.[32] E. Wells, “Using bottom-up techniques in a digital hardware design laboratory to better facilitate experiential learning,” in Proceedings of the 11th International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS’15), 2015.[33] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion
government research lab (Los Alamos National Laboratory). He holds three USPTO patents (IP of Cisco Systems). In addition to a doctorate in Computer Science, Predrag Tosic holds three master’s degrees, two in math- ematical sciences and one in CS. Tosic has a considerable teaching and student research mentoring expe- rience. He has enjoyed working with students of a broad variety of ethnic, cultural and socio-economic backgrounds and at different types of academic institutions. He has been actively involved with IEEE – the Palouse Section and is currently President of the Section’s Computer Society. He is also an active member of ACM, ASEE and AMS.Dr. Julie Beeston, University of Idaho Dr. Julie Beeston has both a
controlled in similar fashion. This provides alearning advantage over simply watching a simulation because students are required to do theexperiment themselves using physical movements similar to those used in the real world. As aresult, they learn the procedure by performing it, and will have better recollection of SEMimaging procedures when required to use a real SEM later on.In order to gauge the efficiency of the VR laboratory in teaching students correct lab procedures,a group of 12 students was introduced to the VR lab and asked to complete an experiment. The12 students were selected from UVU's computer science, computer engineering, electricalengineering, and animation and game development departments to ensure they had decentexperience in
engineering and technology systems domains.Dr. Srikanth Venkatesan, California State Polytechnic University, Pomona Dr. Venkatesan is an assistant professor in Computer Information Systems department at Cal Poly Pomona. He received his doctorate degree from University at Buffalo, The State University of New York. His research interests include cloud computing, information assurance, health informatics, online social networks, social network analytics and e-commerce. His teaching expertise at the graduate level is in the area of cloud computing and internet of things. At the undergraduate level, he has taught object-oriented systems analysis and design, intermediate java programming, management information systems, statistics
touches upon the existing attempts at buildingsuch a near-world lab for academic research and teaching purposes and their challenges. TheSCADA laboratory we designed and the research findings we present will be either used todevelop new courses or supplement the existing courses in the undergraduate and graduatecurriculum with fairly enough number of hands-on activities. Moreover, our paper highlights thechallenges, limitations and the methodologies in the project to achieve these goals. Thecross-disciplinary design of the lab allows students from various programs with specific goals touse the lab for their studies.Related WorkThe SCADA systems have been target of attacks particularly in the last two decades with theadvancements in technology. As
student-centered laboratory,” Proc. 32nd IEEE FIE, Boston, MA, Nov. 2002. [4] J.-S. Chenard, Z. Zilic, and M. Prokic, “A laboratory setup and teaching methodology for wireless and mobile embedded systems” IEEE Trans. Educ., Vol. 51, No. 3, pp. 378-384, Aug. 2008. [5] J.W. Thomas, “A review of research on project-based learning,” San Rafael, CA: Autodesk Foundation. 2000. [6] K. Edström and A. Kolmos, “Comparing two approaches for engineering education development: PBL and CDIO,” Proc. 8th Int. CDIO Conference, Queensland University of Technology, Brisbane, July1-4, 2012. [7] J. Malmqvist, K. Edström, K. Gunnarsson, and S. Östlund, “Use of CDIO standards in Swedish national evaluation of engineering educational programs,” Proc
National Laboratory). He holds three USPTO patents (IP of Cisco Systems). In addition to a doctorate in Computer Science, Predrag Tosic holds three master’s degrees, two in math- ematical sciences and one in CS. Tosic has a considerable teaching and student research mentoring expe- rience. He has enjoyed working with students of a broad variety of ethnic, cultural and socio-economic backgrounds and at different types of academic institutions. He has been actively involved with IEEE – the Palouse Section and is currently President of the Section’s Computer Society. He is also an active member of ACM, ASEE and AMS.Dr. Julie Beeston, University of Idaho Dr. Julie Beeston has both a Master’s degree (from Carleton University
teaches cybersecurity courses. His favorite part of being an information security professional is the rapidly changing environment and the challenge of keeping enterprises protected.Theresa Chasar, Newell Brands Theresa Chasar is an Information Security Operations Director who works with Newell Brands to protect the company’s critical assets and continuously monitor and improve its security defenses. Theresa applies her depth of experience in security engineering and technical architecture to business initiatives, ensuring the alignment of innovation and security. She believes that a balance between business operations and security operations is achievable when teams collaborate on a shared vision. Theresa holds a
Paper ID #22337Cloud Application Monitoring for Efficient Network Management in PublicSchoolsDr. John Pickard, East Carolina University Dr. Pickard is an Assistant Professor at East Carolina University in the College of Engineering and Tech- nology. He teaches undergraduate and graduate Information and Computer Technology (ICT) courses within the Department of Technology Systems. Dr. Pickard plays an active role in building positive and sustainable industry relationship between the college, local businesses, and industry partners. Current industry recognized certifications include; Cisco Certified Network Professional
the program. There must be a suf- ficient number of faculty and they must have sufficient responsibility and authority to improve and implement the program.7. Facilities All facilities (classrooms, offices, laboratories, and associated equipment) must be adequate to support the attainment of the student outcomes. Modern tools, equip- ment and resources must be available to the students, and they must be systemati- cally maintained and upgraded.8. Institutional Institutional support and leadership must be adequate to ensure the continuity of the Support program. Institutional resources provided to the program must be