Asee peer logo
Displaying all 22 results
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
, implementation and utilization aspects of aneducational big-data system that imitate Mobile Service Providers (MSPs) systems to delve deepinto their data stores. The purpose of the educational system was to introduce students todifferent concepts of big-data systems, mobile networks, systems integration, and mobilenetworks traffic analysis, and data management (Tamer Omar, 2016). The paper introduced thebig-data system architecture together with the analytics framework designed to support themobile network.The proposed project to implement the lab resources was planned over three years with anestimate budget of hundred thousand dollars. During this period the project team leader wasplanning to implement a production mobile testbed from small-cells
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State University; Xiangyan Zeng, Fort Valley State University; Chunhua Dong, Fort Valley State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. 1,2017- Oct. 1. 2020) in September 2017. This paper describes the project goals,objectives, and expected outcomes as well as the steps taken to implement some of theproject activities. It should be noted that the project is a work in progress and thus itsimpact on the students and our CS program could not be currently evaluated due toinsufficient data. The effectiveness of the project will be measured annually by Octoberof each project year. We are planning to present the assessment results of this project in afuture article by 2020.Goal StatementThe primary goal of this project is to enhance the retention and graduation rates ofcomputer science students at FVSU through revising curriculum, implementing a peer-to-peer tutoring/mentoring, and
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Laura Kay Dillon, Michigan State University; Michelle Slattery, Peak Research
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, IGERT, and I3 grants for the National Science Foun- dation. She is an Extension Services Consultant to the National Center for Women & Information Tech- nology and has helped more than a dozen universities increase recruiting and retention of women in their technology programs with data driven methods and evaluation support. Four of her clients are NCWIT NEXT Award winners for the Extension Services outcomes they achieved. Michelle has an M.A. in Applied Behavioral Sciences with Human Factors specialization. Her research interests include the eval- uation of STEM projects and programs, diversity studies, strategic planning, and data visualization. c American Society for Engineering
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Zhen Wu, University of Colorado, Boulder; Christopher Lynnly Hovey, University of Colorado, Boulder; Leisa D. Thompson, University of Virginia
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
ofthe economy, from scientific investigation and engineering to finance, health, and nationalsecurity, demands a high quality professional computing workforce that includes the meaningfulparticipation of diverse perspectives and experiences. These perspectives and experiencesinform how personnel approach and solve a wide variety of difficult problems. Computingoccupations and degree programs, however, struggle with generating gender diversity. In 2015,only 18 percent of computing bachelor’s degree recipients were women, despite womencomprising 57 percent of bachelor’s degree recipients across disciplines [1]. Embeddingevidence-based interventions in a strategic plan is an effective approach to increasingenrollments and ultimately attaining
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Deng Cao, Central State University; Cadance Lowell, Central State University; Augustus Morris, Central State University
Tagged Divisions
Computing and Information Technology
itis open source, relatively easy to use, and can be implemented on different platforms. Thedeliverable of the project is a real-time image classifier that can work as a PC program oran android App.2.2. Proposal Phase: Since TensorFlow is mostly written in Python, a brief introductionof Python is presented in the classroom, followed by the introduction to deep learning andCNN. The instructor then demonstrates how to install TensorFlow on Windows. Eachstudent is asked to submit a proposal to identify the classes he or she plans to work on. Thestudent also need to justify why the chosen classes are important and a software applicationshould be created to automatically classify them. The proposal is reviewed by acomprehensive face-to-face
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Justin Daniel Josey, Robert Morris University; Sushil Acharya, Robert Morris University
Tagged Divisions
Computing and Information Technology
Software Industry. His teaching involvement and research interest are in the area of Software Engineering education, Software Verification & Validation, Software Security, Data Mining, Neural Networks, and Enterprise Resource Planning. He also has interest in Learning Objectives based Education Material Design and Development. Dr. Acharya is a co-author of ”Discrete Mathematics Applications for Information Systems Professionals” and ”Case Studies in Software Verification & Val- idation”. He is a member of Nepal Engineering Association and is also a member of ASEE and ACM. Dr. Acharya was the Principal Investigator of the 2007 HP grant for Higher Education at RMU through which he incorporated tablet PC based
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mariangely Iglesias Pena, Iowa State University; Stephen B. Gilbert, Iowa State University; Jamie Payton, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
sites based on their research projects, thereis still a need to provide new PIs with guidance on the different aspects of an REU site such asidentifying resources that can assist in recruiting women and underrepresented minorityapplicants, providing training for graduate students acting as mentors, and strategies for keepinga mentoring connection to undergraduate researchers after they return to their home institutions.Currently, REU site preparation and orientation for new PIs is a face-to-face process thatrequires careful planning and significant travel costs. The REU PI Guide, a set of web-basedresources at https://www.vrac.iastate.edu/cise-reu-pi-resources/, was developed to share bestpractices of experienced PIs and build capacity within
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andreas Febrian, Utah State University; Oenardi Lawanto, Utah State University; Kamyn Peterson-Rucker; Alia Melvin; Shane E. Guymon
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
satisfactionproblems are common problems in computer science. Furthermore, puzzles are also commonlyused in CS instructional approaches [11], [29]–[31], [59], [60]. The third problem was a shopping task, where the participants received a hypotheticalgrocery store floor plan and a shopping list. Using the given floor plan, the participants had todescribe their route for acquiring all items in the list including a gallon of milk, a jar of jam, afive-pound bag of flour, five pounds of chicken, and a bottle of fruit juice. No specific constraintwas given to the participants. At the end of this task, the participants were asked to describe theirusual shopping strategy. We believe people develop a general floor plan of their favorite stores, which
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Arshia Khan, University of Minnesota, Duluth
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
members in this work that was attached to a grade.discussion had different solutions. 2.4 Recommendations for future study Bearing in mind the observations and shortcomings of the interventions we plan to augment our interventions by ensuring the drawbacks observed were addressed. One recommendation is to have icebreaking games at the beginning to make the group
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mehmet Ergezer, Wentworth Institute of Technology; Bryon Kucharski, Wentworth Institute of Technology; Aaron Carpenter, Wentworth Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
fromlinear algebra alongside Python and Numpy.Many undergraduate programs include artificial intelligence (AI) or embedded systems in theirCS curricula [9, 10, 11, 12]. However, the authors could not find a course that would combineboth topics. As the AI algorithms make their way into wearables, smart phones and Internet ofThings (IoT) devices, having experience in real-time AI algorithms will benefit students in theirprofessional careers.The course is still under preparation and is planned to be offered in the summer of 2018. We aresharing our work-in-progress that illustrates the development of the labs for EAI. Two differentforms of learning were taken into consideration: “top down” approach, where the student beginswith a fully functional model
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University
Tagged Divisions
Computing and Information Technology
products.The widespread adoption of LDAP is due to its flexibility, scalability, and compatibility. A computer network related program named Computer Network & System Administration (CNSA) was introduced at MichiganTechnological University in 2003 [3]. The purpose of this program was to serve the needs of industry by educating and training studentsto succeed in the field areas of systems administration and network engineering, with an emphasis on network security. An integral partof the CNSA curriculum is a three credit hour course on Directory Services (DS). In the DS course, students are exposed to topics like planning, designing, implementing and troubleshooting various directory serviceproducts, including Microsoft Windows Active Directory
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Kari L. Jordan Ph.D., The Carpentries; Marianne Corvellec, Institute for Globally Distributed Open Research and Education (IGDORE); Elizabeth D. Wickes, University of Illinois at Urbana-Champaign; Naupaka B. Zimmerman, University of San Francisco; Jonah M. Duckles, Software Carpentry; Tracy K. Teal, The Carpentries
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, intensivepractice, and skill mastery.Short-form (1-2 hour) workshops are often the most universal offering for training. They are theeasiest to book rooms for (or offer online as webinars), find instructors for, and create materialfor. For the participant, one hour is a reasonable amount of time to find in their day and there arerarely any follow-up requirements. Thus, there is very little risk of making a bad time investmentfor the learner, and the instructional team has a lot of flexibility in repeating the training andexperimenting with content. From research methods to retirement plans, this format is anexceptional platform for learners to explore new tools and services. Even though hands-onpractice can be quite limited in this format, this discovery
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Umit Karabiyik, Sam Houston State University; Naciye Celebi; Faruk Yildiz, Sam Houston State University; James Holekamp, Sam Houston State University; Khaled Rabieh, Sam Houston State University
Tagged Divisions
Computing and Information Technology
the ways in which attacker may exploit the vulnerability. • Stage three: Implement Immediate Risk Reduction: The goal in this stage is to identify the need for increasing the SCADA system’s defense mechanism. • Stage four: Implement Long-term Solutions: Once the attacks have been identified, it is important to find long-term solutions. It is also important to find a way to provide a security plan for the systems.During the course of this research project, we have focused on these four stages to attack andanalyze the SCADA system. As the SCADA system is a real-time system, forensic analysis weperform must be live analysis according to [3, 16, 4, 17].According to Ahmed et al. in [3, 16], state of the art digital forensic
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Reza Kamali-Sarvestani, Utah Valley University; Brian Durney, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
don't detract from the learning topicsFinally, we added other elements of fun that aren't directly related to learning but that don'tinterfere with learning. Adding music to the game isn't related to the learning topics, but itdoesn't interfere with them and it increases the sensation game pleasure. Likewise some of themore whimsical and fantastic elements of the game (such as talking magpies and some visualaspects of the museum rooms) add to a sense of fantasy and sensation.We haven't yet incorporated the game pleasures of fellowship and expression into the design ofMagnitude Museum, but those game pleasures can make the game more fun without interferingwith the educational aspects.Future workIn the future we plan to make a multiplayer version
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Dale Drummond, East Carolina University; Philip J. Lunsford II, East Carolina University; Ciprian Popoviciu, Nephos6, Inc.
Tagged Divisions
Computing and Information Technology
district's IT resource portfolio. In that survey it was found that of the school districts whichreplied, "95% of districts rely on cloud services for a diverse range of functions including datamining related to student performance, support for classroom activities, student guidance, datahosting, as well as special services such as cafeteria payments and transportation planning." [4]This increased reliance on cloud services, coupled with limited IT staff and resources, makes itdifficult to monitor and support, with traditional network management tools, a portfolio ofofferings which are hosted outside the district's administrative domain and often spanningmultiple administrative domains on the way to and from the district [5]. Also, networkmanagement
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Karen H. Jin, University of New Hampshire; Michael Jonas, University of New Hampshire; Christopher David LeBlanc, University of New Hampshire; Theodore Sean Tavares, University of New Hampshire
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
to develop and prototype a remote wireless network to collect environmentaldata in an extreme weather environment. The project consisted of mechanical design ofpackaging, electrical design of the system and sensors and the software design of the databasesand user interfaces. The main risk was the scale of the company; it was a small privately-ownedfirm with limited resources, very tight budgets, and thin operational margins. The companystated it needed to make the product commercially available after the end of the academic year tobe profitable. The company's business plan stressed rapid time to market and to provide ease ofuse of the system to the final customer. For a successful project from the company's perspective,a working solution
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Farshid Marbouti, San Jose State University; Valerie A. Carr, San Jose State University; Belle Wei, San Jose State University; Morris E. Jones Jr., San Jose State University; Amy Strage
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
fewcourses…they exclude anybody who’s not in their program. This is the only opportunity to dothis path with Python.Another student, who plans to pursue a career as a financial analyst, mentioned the experience ofher cousin as a motivator for enrolling in ACBSS courses. Specifically, she hoped to avoid thechallenges her cousin encountered while on the job due to a lack of programming skills:My cousin [works as a financial analyst] and they require you to have Python and R. She nevertook these classes and she struggles.Three focus group participants discussed the ways in which their perceptions of computingchanged since beginning the ACBSS course sequence. One student described how he initiallyviewed computing as focused mostly on syntax, but now
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona; Srikanth Venkatesan, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
program.The authors are planning to extend this study in future work to include more universities especiallythose interested in offering interdisciplinary programs and study the technical content of thecybersecurity-related courses offered by their respective departments.6. References[1] Juniper Research©, "Cybercrime will Cost Businesses Over $2 Trillion by 2019," 2015. [Online]. Available: https://www.juniperresearch.com/press/press-releases/cybercrime- cost-businesses-over-2trillion.[2] SANS ICS, "Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case," 2016. [Online]. Available: https://ics.sans.org/media/E- ISAC_SANS_Ukraine_DUC_5.pdf.[3] J. B.-S. H. R. R. a. U. Lee, "Anatomy of the Information Security Workforce
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Landon A. Braden; Scott Alexander Kaiser, Utah Valley University; Reza Kamali-Sarvestani, Utah Valley University; Afsaneh Minaie, Utah Valley University; Paul Weber, Utah Valley University
Tagged Divisions
Computing and Information Technology
components will enable a wide range ofcolleges and universities to train the next generation of nanotechnology engineers.AcknowledgementsThis project is supported by the National Science Foundation through the ATE program, AwardNo. ATE 1700695. Any opinions, findings, and recommendations expressed in this paper arethose of the authors and do not necessarily reflect the views of the National Science Foundation.References 1. Poole, Charles P., and Frank J. Owens, “Introduction to Nanotechnology”, Wiley, 2003. 2. R. Feynman,”There’s Plenty of Room at the Bottom”, Engineering and Science, 23(5): 22-36, 1960. 3. Mongillo, John, “Nanotechnology 101”, Greenwood Press, 2007. 4. The National Nanotechnology Initiative – Strategic Plan, December
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Vuk Marojevic, Virginia Tech; Antoni Gelonch-Bosch, Universitat Politècnica de Catalunya; Jeffrey Reed, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
verify the suitability of the proposed implementation w.r.t. the project specifications, which are based on those defined in the standard, and b) Define Performance Tests to analyze the impact of the chosen techniques on the overall system performance.Along with defining those tests, the team develops a set of figures of merit (FOMs) for bothtypes of tests and uses those to quantitatively characterize the performance of the system w.r.t.the project requirements.Developing appropriate FOMs and test plans and analyzing how these are specified in thestandard is a very valuable educational experience. Regulated tests allow interactions among thestakeholders (device manufacturers, network operators, service providers, etc
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
the professor either directly or indirectly by not completing the assignment.On one particular recent occasion, this method revealed that almost 14% of the students in myupper-level Computer Science class did not have the skills to write a relatively simple piece ofcode. Most of the students had a good reason for not having developed coding skills, and onceidentified, I could give those students the extra attention they needed since they also agreed thatthey had a deficiency. At this level, the three important steps are to 1) identify deficiencies, 2) havethe student agree to devote the time and effort required to overcome the deficiencies and 3) lay outa plan for the student's success.3 Another Experience: From Mathematics to Computer
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Michael Oudshoorn, Northwest Missouri State University; Rajendra K. Raj, Rochester Institute of Technology; Stan Thomas, Wake Forest University; Allen Parrish, United States Naval Academy
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
academic quality. • Demonstrate accountability. • Encourage, where appropriate, self-scrutiny and planning for change and needed improve- ment. • Employ appropriate and fair procedures in decision making. • Demonstrate ongoing review of accreditation practice. • Possess sufficient resources.This clarifies ABET’s role as one of accrediting programs through a focus on continuous im-provement, curriculum, student outcomes, skilled faculty, and adequately resourced programs.The accreditation criteria discussed above makes that clear. While compliance with federal lawsis important, it is not regarded as an indication of a commitment to continuous improvement andexcellence in education. Furthermore, since ABET accredits programs