Asee peer logo
Displaying results 1 - 30 of 39 in total
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mia Minnes, University of California, San Diego; Sheena Ghanbari Serslev, University of California, San Diego ; Madison Edwards
Tagged Divisions
Computing and Information Technology
[school anonymized for publication] change as a result of your internship? How will yourexperiences this summer shape your approach to next quarter and beyond?” at the end of their internship.This mixed-methods approach helps us track students’ motivations, perspectives, and plans for action andsituates their internship as an integral part of their CSE undergraduate education.B. Background 1) The role of motivation in learning: Motivation is critical to learning and leads one to pursueand continue to pursue an objective [1, Part II]. Importantly, motivation is believed to be an emergentphenomenon, meaning it can develop over time and be updated based on new experiences. As described in[2], self-efficacy theory [3] and situational interest
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Franz J. Kurfess, California Polytechnic State University, San Luis Obispo; Maria Pantoja, California Polytechnic State University, San Luis Obispo; Irene Humer, California Polytechnic State University, San Luis Obispo
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. This exposed our students tocollaborators among different fields, with their own terminology, goals, work methods andpractical approaches. Our paper reports on the initial experiment during the Fall 2019 term,involving two sections of an Artificial Intelligence class and one section of a Deep Learningclass. We are planning to continue this collaboration in the future.Keywords: Collaborative Learning, Interdisciplinary, Inter-Class teamwork 1. IntroductionStudents at California Polytechnic State University, San Luis Obispo (Cal Poly) are exposed topractical, hands-on educational activities throughout their course of studies, reflected by theuniversity’s “Learn by Doing” motto. In the Computer Science, Software Engineering andComputer
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Leila Zahedi, Florida International University; Stephanie J. Lunn, Florida International University; Samira Pouyanfar, Microsoft; Monique S. Ross, Florida International University; Matthew W. Ohland, Purdue University, West Lafayette
Tagged Divisions
Computing and Information Technology
engineering through the exploration of: 1) race, gender, and identity in the engineering workplace; 2) discipline-based education research (with a focus on computer science and computer engineering courses) in order to inform pedagogical practices that garner interest and retain women and minorities in computer-related engineering fields.Dr. Matthew W. Ohland, Purdue University at West Lafayette Matthew W. Ohland is Associate Head and Professor of Engineering Education at Purdue University. He has degrees from Swarthmore College, Rensselaer Polytechnic Institute, and the University of Florida. His research on the longitudinal study of engineering students, team assignment, peer evaluation, and active and collaborative
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
James K. Nelson Jr. P.E., Texas A&M University; Brent L. Donham, Texas A&M University-Commerce
Tagged Divisions
Computing and Information Technology
, only seven people even click on one of the ads, let alone apply. [1]In 2011 the Cisco Internet Business Solutions Group presented the data shown in Figure 1. Theyreported that sometime between 2008 and 2009 the number of connected devices exceeded theworld population.Figure 1: Growth of internet-of-things versus population [2]Within major telecommunications companies, the mix of services provided is changing. Data forAT&T, as presented by the Wall Street Journal, are presented in Figure 2. Of interest is thedecrease in wireline services and the increase in wireless services. Although wireless servicessegment grew by six percent, the revenue from wireless services grew by 166 percent. 70% 60
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Elsa Q. Villa, University of Texas at El Paso; Ann C. Gates, University of Texas at El Paso; Sanga Kim, University of Texas at El Paso ; David S. Knight, University of Washington
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
degrees awarded each year [1]. As such, in 2006 a team of faculty from seven Hispanic-Serving Institutions (HSIs) formed the Computing Alliance for Hispanic Serving Institutions(CAHSI) to create a unified voice for consolidating the strengths, resources, and concerns of HSIsand other groups to address the shortage of computing professionals, especially Latinx. Over time,the number of CAHSI institutions grew; and, in 2018, CAHSI was awarded an INCLUDES grantfrom the National Science Foundation to maximize its national impact using a collective impactframework. For CAHSI INCLUDES to be a successful alliance, it must contribute to reducingthat gap, which is an economic and educational equity imperative [2].The national CAHSI INCLUDES Alliance has
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jorge Crichigno, University of South Carolina; Elias Bou-Harb, University of Texas at San Antonio; Elie Kfoury, University of South Carolina; Jose Gomez, University of South Carolina; Antonio Mangino, University of Texas at San Antonio
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
overlooked by practitioners and researchers. Additionally, the platform has supportedworkshops organized across the country. Workshops are co-organized with organizations thatoperate large backbone networks connecting research centers and national laboratories, andcolleges and universities conducting teaching and research activities.1. IntroductionGeneral-purpose enterprise networks are capable of transporting basic data, e.g., emails,multimedia, and web content. However, these networks face many challenges when movingpetabytes (PBs) of scientific data, e.g., genomic, climate, imaging, and high-energy physics, [1].As a response, network architects have developed the concept of a Science Demilitarized Zone(Science DMZ or S-DMZ) [2] as parts of a
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Daqing Hou, Clarkson University; Yu Liu, Clarkson University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. I. I NTRODUCTIONHigh Performance Computing (HPC) stands at the forefront of engineering innovation [1, 2].With affordable and advanced HPC resources more readily accessible than ever before,computational simulation of complex physical phenomena is an increasingly attractive strategyto predict the physical behavior of diverse engineered systems [2], such as systems in nuclearsafety [3], outcome of cancer treatment [4], or multidimensional flight stresses on aircraft. Tomaintain the U.S.’s leadership position in HPC production and application [2], and to meet theneeds of the rapidly growing HPC market [5], American institutions of higher education mustproduce a sufficient supply of highly-trained HPC professionals. Sadly, at current rates
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Abul K. M. Azad, Northern Illinois University
Tagged Divisions
Computing and Information Technology
effectively and also achieve intended outcome [1, 2]. Sometimes students like toperform additional experiments beyond their assigned tasks. It is usually difficult toaccommodate any extra time due to the lack of available resources to keep the laboratoriesopen. Additionally, laboratory facilities are often inaccessible to the students of otherdepartments within the same institution because of their geographical location. At the sametime too much laboratory equipment lies idle during most of its usable lifetime. Only aremote experimentation facility can provide cost effective and unlimited access toexperiments and maximize the utilization of available resources [3, 4, 5]. Moreover, this willallow inter-laboratory collaboration among universities and
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Yuzhong Shen, Old Dominion University; Anthony W. Dean, Old Dominion University; Rafael Landaeta, Old Dominion University
Tagged Divisions
Computing and Information Technology
animations to the vehiclecomponents and parts under diagnosis and maintenance.This project contains several major tasks: 1) 3D modeling of the vehicle, including all internaland external parts to be displayed in the AR application, 2) 3D printing of the vehicles that onlyrequires the external parts that requires conversion from the file format used in Task 1 andfurther optimization of the model for 3D printing, 3) software development in Unity that utilizesmobile devices and Vuforia to generate the AR application for vehicle maintenance andoperation, and 4) preliminary research on software and information architecture to supportefficient development of AR applications. This project is most relevant to the following ABEToutcomes: 1) an ability to
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University; Kimberlyn Gray, West Virginia University Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
data for a planned multiple semester longer term project.This paper contains (1) motivation and goals for this work, (2) outcomes and learning objectives,(3) instructions on how to design this kind of assignment, (4) the video assignment write up, (5)the rubric for the video, (6) the rubric for peer feedback, and (7) the rubric for reflection. Thispaper focuses on the structure and instruments used during the course.About the CourseArtificial Intelligence (AI) is being used to tackle more and more of the real-world problemsaround us. EECS 4901 Special Topics: Introduction to Artificial Intelligence will introducestudents to the fundamentals of Artificial Intelligence (AI). During this course students will lookat various problems being solved
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Lina Battestilli, North Carolina State University; Sarah Korkes, North Carolina State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
found that it takes students more submission attempts in the auto-grader whenthey are given BT Apply/Analyze-type questions that contain some starter code. Studentscomplete the auto-graded assignments with fewer number of submissions when there is no-startercode and they have to write their solution from scratch, i.e. BT Create-type of questions.However, when writing code from scratch, the students’ code quality can suffer because thestudents are not required to actually understand the concept being tested and might be able to finda workaround to pass the tests of the auto-grader.IntroductionThe number of undergraduates seeking Computer Science (CS) degrees has nearly doubled inrecent years 1 . To manage large course enrollments, many CS
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Hassan Rajaei, Bowling Green State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
and howthey can advance to more sophisticated scenarios. Like a computer game, students become excitedto improve their level of knowledge and go beyond a simple laboratory. They develop the datamodel, implement a base, then improve to intermediate and advanced models. Like a game, severalstudents often go beyond and develop additional scenarios of their own interest.1. IntroductionSimulation in education is a well-known and an established field. Engineering education, defensetraining, and medical exercises are a few noticeable examples. As part of the degree requirements,engineering students often learn how to use modeling and simulations for their future workplaces.Whether designing and constructing bridges, buildings, auto vehicles
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Hassan Rajaei, Bowling Green State University
Tagged Divisions
Computing and Information Technology
from CACTI the one from SimpleScalar to get total numberof Access per second. Our results were scrutinized against others and found that in most cases theywere similar or slightly improved for multilevel cache associativity.1. Introduction Caches are high-speed buffers acting as local memories for CPU to store recently or mostfrequently accessed instructions and data fetched from RAM memory. A chase reduces the averageaccess time of the main memory as well fetch latencies. In recent CPUs caches have multi-levelsand associativity. The concept of multi-level cache is illustrated in Figure 1. The time taken toaccess the main memory can range from 300 to 600 nanoseconds while accessing the cache onlytakes 50 to 100 nanoseconds [1]. This is
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Vukica M. Jovanovic, Old Dominion University; Murat Kuzlu, Old Dominion University; Otilia Popescu, Old Dominion University; Abdul Rahman Badawi, Old Dominion University; Deborah Kay Marshall, Norfolk Public Schools; Salih Sarp, Old Dominion University; Spyridoula Tsouganatou, Old Dominion University; Petros J. Katsioloudis, Old Dominion University; Linda Vahala, Old Dominion University; Hongyi Michael Wu, Old Dominion University
Tagged Divisions
Computing and Information Technology
regular curriculum. In 2014, Governor Terry McAuliffe (Commonwealthof Virginia) established the “Cyber Virginia and the Virginia Cyber Security Commission” withrecommendations that a cybersecurity workforce pipeline should start in K-12 education and thatvarious pathways should be developed and implemented across the Commonwealth. This paperwill provide an initial look into a project funded by the Department of Education that is focusedon the Career and Technical Education (CTE) pathways in Computer Science and Cybersecurity.It is the first year of implementation.IntroductionComputer science has been added to the science curricula on the high school level in theCommonwealth of Virginia in 2016 [1]. However, since there is high demand for a
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Benjamin Chambers
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
self-driving car, also known as an autonomousvehicle (AV), connected and autonomous vehicle (CAV), driverless car, robo-car, or robotic caris a vehicle that is capable of sensing its environment and moving safely with little or no humaninput [1, 2, 3, 4].” “Self-driving cars combine a variety of sensors to perceive their surroundings,such as radar, lidar, sonar, GPS, odometry and inertial measurement units [1]. Advanced controlsystems interpret sensory information to identify appropriate navigation paths, as well asobstacles and relevant signage [5, 6, 7].” It can be said that autonomous vehicles are complexembedded devices.The area of autonomous vehicles goes back to at least the 1920s where the first radio-controlledvehicles were designed
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona
Tagged Divisions
Computing and Information Technology
gamblingcasinos. The Monte Carlo method (MCM), also known as the method of statistical trials is atraditional marriage of two major branches of theoretical physics the probabilistic theory ofrandom process dealing with Brownian motion or random walk experiments and potentialtheory, which studies the equilibrium states of a homogenous medium. It is a method ofapproximately solving problems using sequences of random numbers. It is a means of treatingmathematical problems by finding a probabilistic analog and then obtaining approximateanswers to this analog by some experimental sampling procedure.Monte Carlo methods have three characteristics: 1. Random sample generation 2. Known input distribution 3. Numerical experimentsThe direct output
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Simeon Ntafos, University of Texas at Dallas
Tagged Divisions
Computing and Information Technology
Change of Major Policy and its EffectsAbstract: Considerable attention has been paid to factors affecting student's selection ofEngineering and related majors [1, 3, 5] and issues affecting retention and graduation in thesemajors [4, 7]. Lesser attention has been paid to change of major policies and their effects [2].We study the history and effects of "change of major" policies in the Erik Jonsson School ofEngineering and Computer Science at the University of Texas at Dallas. We further focus ontwo closely related degree programs (Computer Science and Computer Engineering) that aredelivered by different departments within the School. A university-wide policy that justrequired "good standing" to change major up to four years ago has evolved into
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephen Michael MacNeil, University of California, San Diego; Mohsen M. Dorodchi, University of North Carolina at Charlotte; Erfan Al-Hossami, University of North Carolina at Charlotte; Aileen Benedict, University of North Carolina at Charlotte; Devansh Desai, University of North Carolina at Charlotte; Mohammad Javad Mahzoon, Core Compete Inc.
Tagged Divisions
Computing and Information Technology
currently exists a dearth of tools for analyzing the curriculum thatincorporates course dependencies as defined by curriculum designers while also consideringstudents’ pathways through the curriculum. In this paper, we present Curri, a data-drivencurriculum visualization system that scrapes dependencies from our university’s publishedcurriculum and leverages student academic data to determine when, on average, students takeeach course. We evaluate our approach with a case study and two focus groups. This workprovides initial evidence that considering both dependencies and students’ temporal performanceleads to new analyses and insights.Figure 1: Curri, a curriculum visualization system that leverages curricular dependencies (pre-requisites) and
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Sin Ming Loo, Boise State University; Liljana Babinkostova
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
team, and Kali Linux. In this paper, we provideexamples on how students’ knowledge of CPS security changes over the course of the program,how students are supported in and out of the classroom towards advancing their knowledge in thisfield. We also highlight the impact that project-based and team coordinated learning can have onincreasing students’ understanding of the fundamentals of CPS security.IntroductionA recent study by Cybersecurity Ventures [1], a respected publisher of cybersecurity content,predicts that 3.5 million cybersecurity jobs around the world will be unfilled by 2021. In the UnitedStates, the demand for professionals with cybersecurity expertise is outpacing all other occupations[2]. These reports, along with many others
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alyssa Mendlein, Temple University; Thuy-Trinh Nguyen, Temple University ; Aunshul Rege, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
- physical security, and advancing cybersecurity education in multiple STEM fields. c American Society for Engineering Education, 2020 Cybersecurity Awareness and Training Through a Multidisciplinary OSINT Course Project1. IntroductionOpen Source Intelligence (OSINT) is “based on information which can be obtained legally andethically from public sources” [1]. OSINT has risen in value recently, as technological advanceshave increased the amount and accessibility of publicly available material [2], [3]. Open sourceintelligence can be used offensively, such as during the reconnaissance stage of a cyberattack [4],or defensively, as when private corporations use OSINT to find out their
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Ciprian Popoviciu, East Carolina University; Philip J. Lunsford II, East Carolina University; John Pickard, East Carolina University; Colby Lee Sawyer, East Carolina University; Jarvis Woodburn; Zachary Ryan Zynda, East Carolina University; Dale Drummond, East Carolina University
Tagged Divisions
Computing and Information Technology
, Service performance, Cisco WebEx Board, Raspberry PI, SaaS,Monitoring.Neither the entire paper nor any part of its content has been published or has beenaccepted for publication elsewhere. It has not been submitted to any other journal.1. IntroductionDistance Education is made possible by real time collaboration and interaction which in turn are enabledby a set of ever improving set of technologies and services. This evolution and these improvementsprovide the tools for delivering a very rich and effective learning experience regardless of thegeographical location of either students or expert instructors. Distance Education and DistanceCollaboration are particularly impactful in communities lacking the resources to provide access to
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Peng Li, East Carolina University
Tagged Divisions
Computing and Information Technology
fromthe traditional remote lab approach in that the whole lab environment is virtualized and hosted ona commercial public cloud (GCP) with better availability, scalability and usability [1]. A studentsurvey was conducted anonymously to evaluate the hands-on labs and lab environments. Theoverall feedback was positive. The whole experience may be useful for other institutions that areinterested in adopting commercial, public cloud platforms in laboratory education.2. MOTIVATIONOur Information and Computer Technology program focuses on learning by doing. Hands-onlaboratory is always a vital part of the curriculum. Laboratory courses serve not only on-campus,face-to-face (F2F) students, but also online, distance education (DE) students
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Vigyan Jackson Chandra, Eastern Kentucky University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
in hand. The presentation includesinformation about free and open-source software that allows annotations of electronicdocuments.KeywordsCritical reading, Annotation, Network diagrams, Icons, Symbols, Encode, Decode information,Visual thinkingIntroductionReading of any sort in general, and technical reading, in particular, naturally raises questionsabout the topics. It invites engagement and application of theory to practice. When students feelintrinsically compelled to add their notes next to examples or procedures in the text, they aregoing beyond merely reading it. Self-Determination Theory (SDT) [1] provides a framework forunderstanding how to promote motivation. By supporting the three basic psychological needs ofcompetence, autonomy
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jeong Yang, Texas A&M University-San Antonio; Brandon Earwood, Texas A&M University-San Antonio; Young Rae Kim, Texas A&M University-San Antonio; Akhtar Lodgher, Texas A&M University - San Antonio
Tagged Divisions
Computing and Information Technology
security modules with theMEA project improved their understanding of the course materials and their interests incomputer science. After implementing security modules with the MEA project, students showeda better understanding of cyber security concepts and a greater interest in broader computerscience concepts. The instructor’s beliefs about teaching, learning, and assessment shifted fromteacher-centered to student-centered, during his experience with the security modules and MEA.1. IntroductionSoftware impacts a large number of people’s lives in a myriad of ways. Software security isessential for guaranteeing that software is safe and behaves as intended. Markettos et aladdressed that we face crises with security vulnerabilities in systems design
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Saeed Al-Haj, Ohio Northern University
Tagged Divisions
Computing and Information Technology
Internet and the usage of computer and mobileapplications, the need for cybersecurity professional and experts will continue to expand.Therefore, graduating students who have proper cybersecurity instruction becomes a necessity.This can be achieved by incorporating modern security analysis tools and engaging students inbuilding secure systems throughout the undergraduate curriculum. The primary goals are: 1) tohave more systems and products with fewer exploits and vulnerabilities, and 2) to increase thenumber of professional individuals who are interested in cybersecurity careers and have the propercybersecurity knowledge and training.One key challenge in implementing and designing cybersecurity exercises in classrooms is havingthe proper
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
expected to learn such skills on their own. Students with less pre-college orextracurricular computing experiences may have fewer of these practical skills and lessexperience learning on their own. Such students may be at an academic disadvantage or feelintimidated 1,2 . Realizing this gap motivated us to revise a key introductory course in ourcurriculum. CS2104 Problem Solving in Computer Science teaches students problem-solvingskills in conjunction with an introduction to various practical computer science topics such asusing version control, developing websites, navigating networks, and interacting with databases.The intention is to: 1. provide practical technical skills needed in a variety of computer science settings, 2. improve problem
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Natasha Smith P.E., University of Virginia
Tagged Divisions
Computing and Information Technology
instructionaltechnology tools enabled learning. The tools were selected to engage students in multiple formats:1) those that attended class in person, 2) those who participated in the live stream class, and 3) thosewho would watch the recorded class later in the day. The Matlab Grader feature was instrumentalin providing students practice with computational solutions to vibrations problems. With this tool,instructors create assignments that students solve with a Matlab script. When the student submitshis or her own code, it is automatically graded against the specified output of the instructor solution.Though it would be useful regardless of delivery mode, the Grader was particularly valuable ingetting real-time feedback to students in keeping with the fast pace
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Tamer Omar, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona; Kristina Rigden, California State Polytechnic University, Pomona; Thomas Ketseoglou, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
framework for students’ collaboration on a practical project. The frameworkconsists of four modules divided between the three disciplines: 1) project scope, systemintegration, and teamwork incorporation; 2) system engineering, cybersecurity design, andapplication development; 3) system cybersecurity algorithms, data collection, organization, andanalytics; 4) system business planning, cybersecurity applications operations implementation, andmaintenance. The paper also presents an example for an IoT based project to apply the frameworkand show the projected course model in developing the IoT project.INTRODUCTIONThe demand for qualified cybersecurity professionals is increasing in an unprecedented rate.Advancement in Internet of Things (IoT) and
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Shinelle Hutchinson, Purdue University, West Lafayette; Yung Han Yoon, Purdue University, West Lafayette; Neesha Shantaram; Umit Karabiyik, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
andgraduate) work under the supervision of their faculty advisor to populate this lab with relevantIoT devices to simulate that of a smart home. This setup would allow us to simulate possiblereal-world smart home events (i.e. IoT device compromise, IoT device as a witness) which we canthen investigate to both find answers to aforementioned questions and develop efficient methodsto investigate these IoT devices. In this paper we will discuss several ways in which IoT devicesin a smart home can be compromised and also investigate these devices after the compromise todetermine what data can be recovered, how to recover the data and where this data resides.1 IntroductionInternet connected devices are constantly being introduced to the public as
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jared Oluoch, University of Toledo
Tagged Divisions
Computing and Information Technology
October 2000. In thegeneral review of 2006, the CSET program was reviewed by both Computing AccreditationCommission (CAC) and TAC of ABET. The CSET program is currently accredited by both CACand Engineering Technology Accreditation Commission (ETAC) - the successor of TAC. Thispaper demonstrates how the CSET program, housed in the Department of EngineeringTechnology at The University of Toledo, satisfies both ABET Computing AccreditationCommission (CAC) and Engineering Technology Accreditation Commission (ETAC) curriculumrequirements. CSET Science Engineering TechnologyFigure 1. Relationship between CSET and Computer Science and Engineering ProgramFigure 1 illustrates the ideal relationship between the