Asee peer logo
Displaying all 14 results
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Nikunja Swain P.E., South Carolina State University; Biswajit Biswal, South Carolina State University
Tagged Divisions
Computing and Information Technology
these processes successfully exceptSACSCOC and we started offering the curriculum courses from 2015.Laboratory ModulesLaboratory modules are used for teaching, research and outreach, and the design of laboratory modulesreflect these uses. We use two different laboratory settings for our cybersecurity concentration courses –virtual and face-to-face.The virtual laboratory is from the NDG NetLAB+(https://www.netdevgroup.com/content/cybersecurity). This platform provides our students withlaboratory experiences on number of cybersecurity and computer science topics in an onlineenvironment. Our students conduct experiments in NISGTC Security+, NISGTC Network Security,NISGTC Forensics, NISGTC Ethical Hacking, CSSIA CompTIA Security+. This laboratory
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Zhaohong Wang, California State University, Chico; Jing Guo, California State University, Chico
Tagged Divisions
Computing and Information Technology
setting [7]. A kernel tracing tool has beenused in explaining the concepts in the GNU/Linux Operating System. The target is not really anRTOS, however, the method reveals that understanding the internal mechanism is the key tounderstand any operating system [8]. A focus on the networking aspect of the RTOS kernel wasexplained by teaching the CAN bus. The emphasis was to make clear the networking part of theRTOS [9]. Laboratories were developed for teaching RTOS. For example, a virtual machineenvironment was introduced to reduce the setup time [10]. A commercial grade open sourceRTOS, FreeRTOS, was taught to show the deployment of RTOS. The emphasis was on using theFreeRTOS but not designing an RTOS [11]. The approach in [11] is a “top-down
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Xiaoyan Gong, Institute of Smart Education, Qingdao Academy of Intelligent Industries. ; Liang Zhao, Faculty of Information Technology, Beijing University of Technology; RenHao Tang, Faculty of Information Technology, Beijing University of Technology; YaNa Guo, Faculty of InformationTechnology,Beijing University of Technology; Xiwei Liu, Qingdao Academy of Intelligent Industries; Institute of Automation, Chinese Academy of Sciences; Jian He, Faculty of Information Technology, Beijing University of Technology; Fei-Yue Wang, National Key Laboratory of Management and Control for Complex Systems, Chinese Academy of Sciences; Ying Tang, Rowan University; Wanruo Shi, Beijing Normal University; Xiaojie Niu, Beijing Normal University; Xinzhu Wang, Beijing Normal University
Tagged Divisions
Computing and Information Technology
of Technology An undergraduate of Beijing University of TechnologyMiss YaNa Guo, Faculty of InformationTechnology,Beijing University of Technology I am a senior student of Beijing University of Technology,majoring in Computer Science and Technology.Prof. Xiwei Liu, Qingdao Academy of Intelligent Industries; Institute of Automation, Chinese Academy ofSciences Xiwei Liu is an associate professor of engineering at the State Key Laboratory of Management and Control for Complex Systems, Institute of Automation, Chinese Academy of Sciences, and an executive deputy director of Institute of Smart Education Systems, Qingdao Academy of Intelligent Industries. He received the Ph.D. degree at Nara Institute of Science and
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Hugh Jack P. Eng. P.E., Western Carolina University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
an off-campus Master’s program. Growth over a few years hasoutpaced the acquisition of new faculty, space, and equipment. The conflict of accommodatingmore students within the constraints of the limited resources is making scheduling increasinglymore difficult. This work was inspired by standard scheduling duties such as finding overlappingcourse times, faculty load calculation, keeping track of adjuncts, dealing with schedules toaccommodate students out of sequence, and integration with math and physics courses.Tools were created to perform data manipulation and analysis for standard scheduling tasks.These included calculations often foreign to other non-STEM departments such as differingcredit for teaching laboratories. At the point of
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Vigyan Jackson Chandra, Eastern Kentucky University
Tagged Divisions
Computing and Information Technology
Education from Eastern Kentucky University; and holds certifications in several computer/networking areas. He teaches courses on computer networking systems and applications, communication systems, along with digital, analog, and machine-control electronics. He is the recipient of the 2013 Golden Apple award for Teach- ing Excellence at Eastern, and has been nominated multiple times for the Critical Thinking Teacher of the Year Award. His professional interests include implementing active teaching and learning strategies, integrating open-source software/hardware with online control, IoT technologies, and deploying electri- cal and telecom technologies in community-based organizations. He is always seeking opportunities
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
Cybersecurity Education Interventions: Three Case Studies,” IEEE Secur. Priv., vol. 13, no. 3, pp. 63– 69, May 2015.[14] J. M. D. Hill, C. A. Carver, J. W. Humphries, and U. W. Pooch, “Using an isolated network laboratory to teach advanced networks and security,” in Proceedings of the thirty- second SIGCSE technical symposium on Computer Science Education - SIGCSE ’01, 2001, pp. 36–40.[15] T. Bläsing, L. Batyuk, A.-D. Schmidt, A. Camtepe, and S. Albayrak, “An Android Application Sandbox System for Suspicious Software Detection.”[16] J. Mayo and P. Kearns, “A secure unrestricted advanced systems laboratory,” in The proceedings of the thirtieth SIGCSE technical symposium on Computer science education
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Seyed Mousavinezhad, Idaho State University; Cheryl Xu, North Carolina State University
Tagged Divisions
Computing and Information Technology
Engineering Education. He is Founding General Chair of the IEEE International Electro Information Technology Conferences. Hossein served as 2002/2003 ASEE ECE Division Chair. He was IEEE Education Society Membership Development Chair and now serves as MGA Vice President (2013/2014) and Van Valken- burg Early Career Teaching Award Chair. Dr. Mousavinezhad received Michigan State University ECE Department’s Distinguished Alumni Award, May 2009. He is recipient of ASEE ECE Division’s 2007 Meritorious Service Award, ASEE/NCS Distinguished Service Award, April 6, 2002, for significant and sustained leadership. In 1994 he received ASEE Zone II Outstanding Campus Representative Award. He is also a Senior Member of IEEE, has
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, Mississippi State University
Tagged Divisions
Computing and Information Technology
project-based learning pedagogy. Someissues implemented in project-based approach are addressed (Khorbotly, 2015). Luo presentedan on-going multiple-project-based pedagogy in electrical and computer engineering program. Inthis course, a sequence of well-prepared projects was assigned to students to cover various topicsto help student learning for enhancement of research skills (Luo, 2015). Behrouzi and Kuchmaaddressed an inquiry-based learning pedagogy used in a freshman civil and structuralengineering curriculum with an equipment-light laboratory course (Behrouzi and Kuchma, 2016).Active-based learning is a learning protocol, in which teaching strives to involve students in thelearning process more directly than in other methods (Luo, 2015). It
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mysore Narayanan, Miami University
Tagged Divisions
Computing and Information Technology
Paper ID #26163Runge-Kutta Algorithm and AssessmentDr. Mysore Narayanan, Miami University DR. MYSORE NARAYANAN obtained his Ph.D. from the University of Liverpool, England in the area of Electrical and Electronic Engineering. He joined Miami University in 1980 and teaches a wide variety of electrical, electronic and mechanical engineering courses. He has been invited to contribute articles to several encyclopedias and has published and presented dozens of papers at local, regional , national and international conferences. He has also designed, developed, organized and chaired several conferences for Miami University
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State University; Xiangyan Zeng, Fort Valley State University; Chunhua Dong, Fort Valley State University
Tagged Divisions
Computing and Information Technology
reflect on their learnings with the aim of improving theirprogramming skills and the quality of their programs.Introductory programming courses have historically high attrition rates because often studentsare not sufficiently and dynamically engaged with programming tasks. In fact, failure rates of 30to 50% have been reported in literature [1]. Beginners frequently feel frustrated and disenchantedwith the subject since the challenges of learning programming appear to be too overwhelming toovercome. While laboratory components of these courses help students with getting feedbackand encouragement in the face of programming challenges, practice and motivation beyond thelab environment remain uncertain. Therefore, it is necessary to explore
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jingshan Wu, Zhejiang University; Yujie Wang, Zhejiang University; Hanbing Kong, Zhejiang University; Ling Zhu, Zhejiang University
Tagged Divisions
Computing and Information Technology
computational thinkingskills. This study first proposes a framework of computational thinking in the contextof engineering (CT-ENG), using qualitative content analysis on industry interviews.The authors then introduce the program of the Robotics Class of Zhejiang Universityin China, providing an integrative approach to teaching computational thinkingeffectively. The Robotics Class engages students in project-based computing-aidedengineering activities throughout the four-year bachelor’s program, and improvestheir computational thinking skills through engineering engagement. The findings inthis study could have some implications for non-CS engineering majors to promotecomputing education and equip students with computational thinking at digital era.Key
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Debra M. Duke, Virginia Commonwealth University; Mandayam Thirunarayanan, Florida International University; Abigail Byram, Virginia Commonwealth University; Peter J. Clarke, Florida International University
Tagged Divisions
Computing and Information Technology
Paper ID #26250Students’ Perceptions Of the Implementation of a Cyberlearning ToolMs. Debra M. Duke, Virginia Commonwealth University Debra Duke is an Instructor and the Undergraduate Director in the Computer Science Department of the College of Engineering at Virginia Commonwealth University.Debra received her Master’s degree from Virginia Commonwealth University in 2006. She worked as a Software Developer at mDimension Technology making use of her experience in several programming languages, database design and devel- opment, software engineering, and web application development. She began teaching computer science
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Naeem Seliya, Ohio Northern University; Heath Joseph LeBlanc, Ohio Northern University; J. Blake Hylton, Ohio Northern University; Ziad Youssfi, Ohio Northern University; Matthew Schweinefuss
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #26201Data-Driven Investigation of Curiosity in Student Text ResponsesDr. Naeem Seliya, Ohio Northern University Dr. Naeem (Jim) Seliya, PhD., is an Associate Professor of Computer Science at Ohio Northern Uni- versity, Ada, Ohio, USA, where he currently teaches Mobile App Development, Data Science, Software Engineering, Software Design Patterns, Net-Centric Computing, and Theory of Computation. His key ex- pertise and interests include: Data Science (i.e., Machine Learning, Big Data Analytics, Deep Learning, Data Quality, Data Visualization, Data Wrangling, and Feature Engineering); Software Engineering and
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Kyle Joseph Wheelhouse, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Design course is to provide our students with a realisticembedded design experience and to teach them the tools and methodologies that can help thembe successful. Our senior design course is structured as a collection of independent studentprojects. This course is offered every semester. Usually, the students in the ComputerEngineering program take this course during their last semester. Students have the option ofworking individually or in group of twos. Students either can come up with an embedded projectthemselves or work on a project that is given to them by their advisor. Students write a proposalto define problems and identify solution approaches for their project and the hardware andsoftware that is needed for their project. After several