Asee peer logo
Displaying results 31 - 60 of 187 in total
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Di Ma, University of Michigan - Dearborn
Tagged Divisions
Computing & Information Technology
, "Using Mobile Phones in Education," in The 2nd IEEE International Workshop on Wireless and Mobile Technologies in Edcuation (WMTE'04), Washinton, DC, USA, 2004.[3] L. S. Vygotsky, "Interaction between learning and development," in Mind in society. The development of higher psychological processes, M. Cole, V. John-Steiner, S. Scribner and E. Souberman, Eds., Cambridge, MA, Harvard University Press, 1978, pp. 79-91.[4] K. R. Clark, Examining the effects of the flipped model of instruction on student engagement and performance in the secondary mathematics classroom: An action research study, Capella University, 2013.[5] F. C. Herreid and N. A. Schiller, "Case Study: Case Studies and the Flipped Classroom," Journal of College Science
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Munish Sharma, Northern Illinois University
Tagged Divisions
Computing & Information Technology
mance. Figu ure 10: A flow wchart for a laboratory eexperiment llinking pagee.Figure 100 shows a floowchart for this t feature, while Figurre 11 shows the front endd of thisapplicatio on. As it is now, n there are a ten experriments availlable for possting for the students. W Withthe drop down menu, one can cho oose which experiment((s) can be poosted and theen click on thhesubmit buutton
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
Pennsylvania in May 2012. Currently, his research interests consist of higher education curricula, both with universities and medical schools.Dr. Ali Sanati-Mehrizy Dr. Ali Sanati-Mehrizy is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. In July 2013, he will begin a Pediatrics residency at the UMDNJ-Newark University Hospital. His research interests involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools.Dr. Reza Sanati-Mehrizy, Utah Valley University REZA SANATI MEHRIZY is a professor of Computing Sciences Department at Utah Valley
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Hassan Rajaei, Bowling Green State University; Eman A. Aldakheel, Bowling Green State University
Tagged Divisions
Computing & Information Technology
  educational  community.  This  paper  examines  how  specific Computer Science courses can be mapped to certain layer(s) of the Cloud (see Sections 4 & 5). Rapid  growth  of  the  cloud  technology  and  promises  to  reduce  the  IT  costs 5  pushed  numerous educational institutions to revise their IT infrastructure and follow the Cloud development. Our university, like many others, is moving to the Cloud within the next five to ten years. Computer Sciences and STEM Education are among prime targets. Ever  since  the  emergence  of  Cloud  Computing,  significant  emphasis  and  efforts  have  been offered in exploring and defining this new technology 4, 7, 8, 9 . Experts predict that by 2020 most institutions  and  enterprises  will  move  to
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Edward F. Gehringer, North Carolina State University
Tagged Divisions
Computing & Information Technology
chapter, Expertiza automatically calculates due dates for later chapters based on a rule—that each due date for each chapter is say, two weeks, later than the corresponding due date for the latest prerequisite chapter. Thus, if Chapter 1’s resubmission deadline is, say, on Sept. 3, and Chapter 1 is a prerequisite for Chapter 2, then Chapter 2’s resubmission deadline will be on Sept. 17. The system sends an e-mail reminder to each student a day or two before the deadline for submitting or reviewing (the instructor determines how far in advance the e-mail is sent). 4. Dashboard for monitoring wiki textbook construction. The instructor needs to be able to keep close tabs on the
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology/City University of New York
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
sstudents andd/or very baddperformaance of otherrs. Figure 2 shows s the peercent of stuudents who pperformed well (i.e. whoobtained >= 7 in the assessmentss) in the diffeerent program mming conccept assessm ments. The figgureillustrates why computer program mming coursses are gatew way courses with low paassing gradess: inmost con nceptual cateegories less than t 50% of students perrformed at an adequate llevel.4.2 Explo oratory Facto or AnalysisTo furtheer understandd the nature of students’ understandiing of computer program
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manghui Tu, Purdue University Calumet; Shiming Xue, Purdue University Calumet
Tagged Divisions
Computing & Information Technology
questions: what information isrelevant to the studied attack, where related fingerprint items can be located, and whatinformation each piece of fingerprint can indicate. Also, an evidence tree can provide thecontextual information to correlate attack operations by examine the fingerprints theyproduce. Furthermore, the contextual information provided to an incident tracking softwaremay have the potential of automating attack reconstruction. Page 24.1075.11References[1] Biggs, S. and Vidalis, S. (2009). Cloud Computing: The Impact on Digital Forensic Investigations. InProceeding of the International Conference on Internet Technology and Secured
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Hassan Rajaei, Bowling Green State University; Saba Jamalian, Bowling Green State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
their desired cloud together with number ofbenchmarks such as matrix multiplications with MPI and/or OpenMP to demonstrate thetransparency and portability of the provided solution.Bibliography1. Peter Mell, Tim Grance, "The NIST definition of cloud computing." 2011.2. Escalante, B. F. (2010). “Cloud Computing Fundamentals”. In Handbook of Cloud Computing. Springer3. Moustafa AbdelBaky, Manish Parashar, Kirk Jordan, Hyunjoo Kim, Hani Jamjoom, A Zon-Yin Shae, Gergina Pencheva, Vipin Sachdeva, James Sexton, Mary Wheeler, Mary F. Wheeler, "Enabling High-Performance Computing as a Service," Computer, vol. 45, no. 10, pp. 72-80, 2012.4. S. Azodolmolky, P. Wieder, R. Yahyapour, "Cloud computing networking: challenges and
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Osvaldo Mangual, Honeywell Aerospace; Marvi Teixeira, Polytechnic University of Puerto Rico; Reynaldo Lopez-Roig, Polytechnic University of Puerto Rico; Felix Javier Nevarez-Ayala, Polytechnic University of Puerto Rico
Tagged Divisions
Computing & Information Technology
mixed-mode (MPI-OpenMP) parallel implementation, including performance and scalability studies, carried out inour 16-node, 64 processor cluster.Based on the prime factor decomposition of the signal length this algorithm, which is based on ablock diagonal factorization of the circulant matrices, breaks a one-dimensional cyclicconvolution into shorter cyclic sub-convolutions. The subsections can be processed,independently, either in serial or parallel mode. The only requirement is that the signal length, N,admits at least an integer, r0, as a factor; N = r0.s. The Argawal-Cooley Cyclic Convolutionalgorithm, has a similar capability but requires that the signal length can be factored intomutually prime factors; N = r0.s with (r0,s) = 1. Since the
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University
Tagged Divisions
Computing & Information Technology
. L., Neff. G. P., Stratton, M. J., and Summers, D. C. S. (2002). Future directions for mechanical manufacturing, and industrial engineering technology programs, Journal of Engineering Technology, 19(1), pp.8-15.[5] Scott, J. (2003). A vision for online kindergarten learning community, Technological Horizons in Education, 30(7), pp.40-43.[6] Boyle, A. P., Bryon, D. N., and Paul, C. R. C. (1997). Computer-based learning and assessment: A palaeontological case study with outcomes and implications, Computers and Geosciences, 23(5), pp.573- 580.[7] Grose, T. K. (2003). Can distance education be unlocked, PRISM, April, pp.19-23.[8] Palais, J. and Javurek, C. G. (1996). The Arizona State University electrical engineering
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona; Simin Shoari; Behdad Kavianpour, University of California, Irvine
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
. 179-187, 1962. [2] S. A. Dudani, K. J. Breeding, and R. B. McGhee, “Aircraft identification by moment Invariants,” IEEE Transactions on Computers C-26, pp. 39-45, 1977. [3] M. R. Teague, “Image Analysis via the General Theory of Moments,” J. Opt. Soc. Am. Vol. 70, No. 8, pp. 920-930, 1980. 13 Page 26.10.14 [4] F. Alt, “Digital Pattern Recognition by moments,” Optical Character Recognition G.L. Fischer et al. Eds., Spartan, Washington, D.C., pp. 240-258, 1962. [5] R. Y. Wong and E. L. Hall, “Scene Matching with Invariant Moments,” Computer Graphics and Image Processing No. 8, pp. 16-24, 1978. [6] C. H
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Gonca Altuger-Genc, State University of New York, Farmingdale; Ilknur Aydin, Farmingdale State College
Tagged Divisions
Computing & Information Technology
in Education Conference, October 12-15, 2011, Rapid City,SD 3. Litzinger, T., Wise, J, Lee, S., and Bjorklund, S., 2003, “Assessing Readiness for Self-directed Learning”, Proceedings of the 2003 American Society for Engineering Education Annual Conference and Exposition, June 22-25, 2003, Nashville, TN 4. Litzinger, T., Lee, S. H., and Wise, J., 2004, “Engineering Students’ Readiness for Self-directed Learning”, Proceedings of the 2004 American Society for Engineering Education Annual Conference and Exposition, June 20-23, 2004, Salt Lake City, UT 5. Litzinger, T., Wise, J.C., and Lee, S. H.,2005, “Self-directed Learning Readiness Among Engineering Undergraduate Students
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Connie Justice, Indiana University Purdue University, Indianapolis; Nichole McFarland, Indiana University Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
. Chandra,D.G.&D.B.Malaya(2012).Roleofcloudcomputingineducation.Computing,ElectronicsandElectricalTechnologies(ICCEET),2012InternationalConferenceon,IEEE. Hartmann,S.B.,Braae,L.Q.N.,Pedersen,S.,&Khalid,S.(2016)."ThePotentialsofUsingCloudComputinginSchools:ASystematicLiteratureReview."TurkishOnlineJournalofEducationalTechnology. Kumar,R.,Gupta,N.,Charu,S.,Jain,K.,&Jangir,S.K.(2014)."OpensourcesolutionforcloudcomputingplatformusingOpenStack."InternationalJournalofComputerScienceandMobileComputing3(5):89-98. Pierce,G.L.andP.F.Cleary(2016)."TheK-12educationaltechnologyvaluechain:Appsforkids,toolsforteachersandleversforreform."EducationandInformationTechnologies21(4):863-880. Reidenberg,J.,Russell,N.C.,Kovnot,J.Norton
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University; Scott Pack
Tagged Divisions
Computing & Information Technology
appreciate the lab experience.While all these topics are addressed in the class, with supporting data, and examples, the lab onlyaddresses a subset of these concepts.The lab is designed around the idea of the time-machine in the movie “Back to the Future”. Asmall microcontroller is connected to two analog input devices—representing the brake andaccelerator of the DeLorean Sports car/time machine used in the movie. The microcontrollerincludes web server hardware and software and it serves up a dynamic web page. Thespeedometer of the DeLorean is displayed on a web page both as an analog speedometer dial andas a digital display.There was some concern that since the movie trilogy was released in the 1980’s, that many of thestudents would be unfamiliar
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
cl t s gn se t st ct h h ev s cl es s ys ys ys c g se et et en le le ra ra ra s rin si m
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Maurice F. Aburdene, Bucknell University; Marie Catherine Pizzorno, Department of Biology, Bucknell University; Alexander P Thompson, Bucknell University
Tagged Divisions
Computing & Information Technology
“Revolution Postponed” is a critical analysis and review of the Human Genome Project. In thisarticle, published in Scientific American, author Stephen S. Hall compares the current progressof the endeavor to its projected outcome and discusses its future potential. The overall sentimentof the article is that the extensive amount of research and resources applied to the project hasproduced too few valuable results. Page 23.636.4When the Human Genome Project commenced in 2000, many anticipated that it would transformmedicine and essentially lead to the cure of most human diseases within ten years. That ten yearwindow has closed, and while the project has
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Francis N Mensah, College of Engineering and Technology, Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
, 2009.10. J. Wang, H. Abid, S. Lee, L. Shu, and F. Xia, “A Secured Health Care Application Architecture for Cyber- Physical Systems.” Control Engineering and Applied Informatics, Vol.13, No.3, pp. 101-108, 201111. N. Falliere, L. O. Murchu, and E. Chien, “W32 . Stuxnet Dossier version 1.4,” [Online] http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_doss ier.pdf, 2011.12. N. Adam, "Workshop on Future Directions in Cyber-Physical Systems Security ", in Report on Workshop on Future Directions in Cyber-Physical Systems Security, January, 2010.13. M.J. Peterson, “Bhopal Plant Disaster – Situation Summary,” Science, Technology & Society Initiative, University of
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing & Information Technology
resident physician at Rutgers University - New Jersey Medical School in Newark, NJ. He is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. His research interests are varied and involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools.Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai Paymon Sanati-Mehrizy is currently a medical student at the Icahn School of Medicine at Mount Sinai. He completed his undergraduate studies in Biology from the University of Pennsylvania in May 2012. Currently, his research interests consist of
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Cory Brozina, Virginia Tech; David B. Knight, Virginia Tech Department of Engineering Education
Tagged Divisions
Computing & Information Technology
Paper ID #9264Credentialing MOOCs: A Case StudyMr. S. Cory Brozina, Virginia Tech Cory Brozina is a PhD student in the Engineering Education department at Virginia Tech. His research is in educational technology and data analysis.Dr. David B Knight, Virginia Tech Department of Engineering Education David Knight is an Assistant Professor in the Department of Engineering Education and affiliate faculty with the Higher Education Program at Virginia Tech. His research focuses on student learning outcomes in undergraduate engineering, interdisciplinary teaching and learning, organizational change in colleges and universities
Conference Session
Information Systems and Computing Potpourri
Collection
2011 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
. J. R. Armstrong and F. G. Gray, "Fault Diagnosis in a Boolean n Cube Array of Microprocessors," IEEE Trans.on Comput., vol. C-30, pp. 587-590, Aug. 1981.2. P. Banerjee et al., "An Evaluation of System-Level Fault Tolerance on the Intel Hypercube Multiprocessor,"Proc. 18th Int'l Symp. on Fault-Tolerant Computing, pp. 362-367, 1988.3. K. Y. Chwa and S. L. Hakimi, "On Fault Identification in Diagnosable Systems," IEEE Trans. Comput., vol. C-30, pp. 414-422, June 19814. A. T. Dahbura and G. M. Masson, "An O(n2.5) Fault Identification Algorithm for Diagnosable Systems," IEEETrans. Comput., vol C-33, pp. 486-492, June l984.5. A. T. Dahbura, "System-Level Diagnosis: A Perspective for the Third Decade" Tech. Rept. AT&T Bell Labs.,1987.6. E
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Afsaneh Minaie, Utah Valley University; Ruhul H. Kuddus, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai
Tagged Divisions
Computing & Information Technology
effects of climate change on public health in my research agenda. My research also involve data mining.Dr. Ali Sanati-Mehrizy Dr. Ali Sanati-Mehrizy is a Pediatric resident physician at Rutgers University - New Jersey Medical School in Newark, NJ. He is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. His research interests are varied and involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools.Mr. Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai Paymon is currently a medical student at the Icahn School of Medicine at Mount
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Secil Caskurlu, Purdue University; Iryna Ashby, Purdue University; Marisa Exter, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
common ground. Acknowledgements The researchers would like to thank the Purdue Research Foundation for supporting thispublication and our research. 20Formal Education and Computing Professionals’ Needs References1 Zweben, S. (2014). Computing Degree and Enrollment Trends. Computing Research Association. Retrieved from cra.org/uploads/documents/resources/taulbee/CRA_Taulbee_CS_Degrees_and_Enrollme nt_2012-13.pdf2 Besterfield-Sacre, M., Cox, M., Borrego, M., Beddoes, K., & Zhu, J. (2014). Changing engineering education: Views of U.S
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Natascha M. Trellinger, Purdue University, West Lafayette; Rebecca R. Essig, Purdue University, West Lafayette; Cary D. Troy, Purdue University, West Lafayette; Brent K. Jesiek, Purdue University, West Lafayette; Josh Boyd, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
, Pages Textbook Title Author(s) Edition Chapter Analyzed Analyzed rd Fluid Mechanics: Cengel, Y.A., & 2014, 3 Ed. 5. Bernoulli and 230-242 Fundamentals and Cimbala, J. M. Energy Equations Applications Fundamentals of Munson, B.R., 2013, 7th Ed. 3. Elementary 141-156 Fluid Mechanics Okiishi, T. H., Fluid Dynamics – Huebsch, W.W. & The Bernoulli Rothmayer, A.P. Equation
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Douglas M. Schutz, Tokyo University of Science; Dante Dionne, Korean Air; Yong-Young Kim P.E., Konkuk University
Tagged Divisions
Computing & Information Technology
tacit.Explicit knowledge is codified and captured in archives and databases in discrete words ornumbers. Tacit knowledge, on the other hand, provides the context for developing andunderstanding explicit knowledge [7]. Tacit knowledge is not codified and is, therefore,harder to communicate. The development of tacit knowledge is a continuous activity betweenindividuals sharing experiences for mutual understanding [6].Knowledge needs to be continuously created in order for it to be continuously shared.Nonaka [6] proposes that knowledge is created through the conversion between tacit andexplicit knowledge via four modes, referred to by the acronym SECI, in a continuous cycle:1) socialization (S) is creating tacit knowledge from other tacit knowledge through
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Norman Pestaina, Florida International University; Tiana Solis, Florida International University; Peter J. Clarke, Florida International Univeristy
Tagged Divisions
Computing & Information Technology
(hoped) improvements, to a revised set of SOs. To that end, some desired attributes of the SeniorProject Rubric are evaluated:RQ1 (Applicability): Does the rubric’s methodology measure attainment of all of the SOs in ameaningful way? If not all, to which SOs is it not applicable?RQ2 (Extendibility): Is the rubric methodology(s) applicable to varied SO categories, and does itlend itself to fine tuning?RQ3 (Consistency): Is there reasonable expectation that repeated application of the rubric toidentical data should yield identical metrics? When there is not, can this shortcoming beameliorated?5.2 MethodThe sources of the data for this study are 22 capstone projects completed between Fall 2010 andSpring 2012, encompassing the efforts of about 82
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Kien A. Hua, University of Central Florida; Gholam Ali Shaykhian, NASA; Robert J Beil, NASA Engineering and Safety Center; KUTALMIS AKPINAR, School of Electrical Engineering and Computer Science, University of Central Florida; Kyle A. Martin, University of Central Florida
Tagged Divisions
Computing & Information Technology
image-processing pipeline to provide a user-friendlyinterface for studying lunar imagery. The Geospatial Data Abstraction Library (GDAL) [14] isused to efficiently access LRO imagery stored in the PDS image file format. We use the LuceneImage Retrival (LIRE) library [15], [16] with the search engine to store and index landformfeature vectors for use during similarity search. NASA‟s World Wind library [17] is used toimplement a 3D interface (Figure 7) for viewing and interacting with GIS (GeographicInformation System) data sets. This approach is motivated by the fact that NASA scientists arealready familiar with the World Wind operating environment. The current prototype allows theuser to browse and search imagery to identify interesting
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Justin L. Hess, Purdue University, West Lafayette; Lorraine G. Kisselburgh, Purdue University; Carla B. Zoltowski, Purdue University, West Lafayette; Andrew O. Brightman, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Bryan A. Jones, Mississippi State University; M. Jean Mohammadi-Aragh, Mississippi State University; Amy K. Barton, Mississippi State University; Donna Reese, Mississippi State University; Hejia Pan, Mississippi State University
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
Paper ID #12829Writing-to-Learn-to-Program: Examining the Need for a New Genre in Pro-gramming PedagogyDr. Bryan A. Jones, Mississippi State University Bryan A. Jones (S’00–M’00) received the B.S.E.E. and M.S. degrees in electrical engineering from Rice University, Houston, TX, in 1995 and 2002, respectively, and the Ph.D. degree in electrical engineer- ing from Clemson University, Clemson, SC, in 2005. He is currently an Assistant Professor with the Mississippi State University, Mississippi State, MS. From 1996 to 2000, he was a Hardware Design Engineer with Compaq, where he specialized in board layout for high
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Forough Sheikh-Ansari, Purdue University; Baijian Yang, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
applications, which are designed for end-users and delivered over the web. Therefore, Cloud Consumers are able to use online applications. In this level of service model, Cloud Consumers need to be authorized to use provided online applications [3].NIST has published its Cloud Computing Reference Architecture in the Special Publication SP500-292. In the presented Architecture, NIST tries to provide an easy way of understanding theoperational intricacies in Cloud Computing [2]. There are five different parts in the NIST CloudComputing Reference Architecture, which are Cloud Consumer, Cloud Provider, Cloud Auditor,Cloud Broker, Cloud Carrier [4].Chandramouli, R., Iorga, M., and Chokhani, S. (2014) discussed cryptographic key managementissues
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Shaundra Bryant Daily, Clemson University; Juan E Gilbert, Clemson University; Wanda Eugene, University of North Carolina Charlotte; Christina Gardner-McCune, Clemson University; Kyla Alanna McMullen, Clemson University; Phillip Wendell Hall Jr, Clemson University ; Sekou L Remy, Division of Human Centered Computing - School of Computing, Clemson University; Damon Lamar Woodard, Clemson University; Tania Roy, Clemson University
Tagged Divisions
Computing & Information Technology
and high school social studies classes. Page 23.144.1 Dr. Gardner-McCune recently completed a year and a half long Post-Doctoral Research position in com- puter science education at Georgia Institute of Technology’s College of Computing where she led the design of the I-3 Experience programs. She holds a B. S. degree in Computer Engineering from Syra- cuse University, and earned both her masters and doctorate in Computer Science from Georgia Institute c American Society for Engineering Education, 2013