Asee peer logo
Displaying results 31 - 60 of 96 in total
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
selected universities aroundthe world. Course offerings of sixty one universities were studied. From this study, it can beseen that universities are using six models to integrate computing intelligence concepts into their Page 23.316.5computer science and engineering curriculum: 1. Offering an undergraduate course on computational intelligence or one of its paradigms. 2. Offering a graduate course on computational intelligence. 3. Integrating computational intelligence paradigms into their traditional courses. 4. Offering a graduate degree on computational intelligence 5. Offering a minor in
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
Computer Engineering Capstone Projects in the Computer Science DepartmentAbstractAs with many computer science and engineering programs, students of the computer engineeringarea of specialization in the computer science program at Utah Valley University (UVU)conclude their degree programs with a semester capstone design experience. The intent is forstudents to utilize competencies developed in the first three years of the curriculum in thesolution of an embedded design problem. This paper presents the details of sample projects thatthe students have done in this capstone course.Background InformationUtah Valley University (UVU) is a state institution with more than 32,000 students. UVU islocated in Utah County which has
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy
Tagged Divisions
Computing & Information Technology
(WSNs) are possibly one of the most important technologies of thiscentury and have the potential to make human life more comfortable. WSNs have emerged as aneffective solution applied to a wide array of problems. The increasing popularity of WSN hasmotivated computer engineering programs to provide students with a foundation in the area. Inorder to integrate wireless sensor networks concepts into our computer engineering curriculum,we have decided to integrate wireless sensor concepts in our Embedded Systems Design IIcourse. A requirement for this course is to write a research paper on the topic of Wireless SensorNetworks. As a result of this assignment, many students have started to do their senior designproject on this subject. This paper
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
physiological functions in a hospital setting. Sensors today are effective for single measurements, however, are not integrated into a “complete body area network”, where many sensors are working simultaneously on an individual patient. Mobility is desired, but in many cases sensors have not yet become wireless. This creates the need for the implementation of new biomedical personal wireless networks with a common architecture and the capacity to handle multiple sensors, monitoring different body signals, with different requirements. The type and number of sensors must be configured according to monitoring needs related to different diseases, treatment, and the patient treatment life cycle12. WMSNs systems have several advantages over traditional wired
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Yosi Shibberu, Rose-Hulman Institute of Technology
Tagged Divisions
Computing & Information Technology
] Amruth N Kumar. Three years of using robots in an artificial intelligence course: lessons learned. Journal on Educational Resources in Computing (JERIC), 4(3):2, 2004.[11] Carlotta Berry. Mobile robotics: A tool for application based integration of multidisciplinary undergraduate concepts and research. In 2010 Annual ASEE Conference & Exposition, Louisville, Kentucky, June 2010. ASEE Conferences. https://peer.asee.org/15642.[12] Michael Georgiopoulos, Ronald F DeMara, Avelino J Gonzalez, Annie S Wu, Mansooreh Mollaghasemi, Erol Gelenbe, Marcella Kysilka, Jimmy Secretan, Carthik A Sharma, and Ayman J Alnsour. A sustainable model for integrating current topics in machine learning research into the undergraduate curriculum
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Frank Jordan Sheen, Brigham Young University; Dale C. Rowe Ph.D., Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
facing dozens of industries wasthe dependency on control systems that never had security as an integral part of theirdevelopment lifecycle [13]. The results of this acknowledgement lead to research efforts wheremechanisms were trying to retrofit legacy systems. However, retrofitting legacy systems doesnot provide a long term solution to the problem[14].The purpose of this paper is to evaluate the approaches taken in higher education to address theproblem facing SCADA security. The first section describes how higher education currentlyhandles security in regards to SCADA/ICS environments. The second section discusses areas offocus pertaining to different disciplines. The third section discusses tools that can be used toexpose students to SCADA
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
students innew ways. For example, Guzdial proposed an introductory media-centric programming coursefor non-majors, in which students manipulated sound, images and other media [14]. Othershave argued for game-based projects, and some have integrated gaming throughout theircomputing curriculum [15, 16]. Alternatively, some educators have introduced hardware into theclassroom. For example, Mahmoud uses mobile devices extensively through many computingcourses, enabling students to work with their own, personal devices [17]. Others have attemptedusing robotics in their curriculum, but have experienced varying results in student success [18].Overall, it is apparent that many educators are concerned with the current state of computingeducation, and are
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Chris Foreman, Purdue University, West Lafayette; Matthew Turner, Purdue University (Statewide Technology); Karl Perusich, Purdue Statewide Technology DO NOT USE DUPE
Tagged Divisions
Computing & Information Technology
Computer Information Science (CIS), but for students in engineering whoutilize ICS as a tool to control a physical process, e.g. critical infrastructure. Page 26.573.22. Integration into existing programsCyber-security concepts are at least generally addressed in CIS and related disciplines such asInformation Technology (IT) and Computer Science (CS), if not specifically addressed in cyber-security concentrations within these. What is missing from these is an understanding of real-timecontrol systems as they are deployed in industry, and their associated industrial processes, asthese tend to be addressed in the electrical, mechanical, and
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Brian R. King, Bucknell University; Ashwin Satyanarayana, New York City College of Technology
Tagged Divisions
Computing & Information Technology
have multiple databases, from multiple sources, often with their own formats. Adata warehouse is a type of database that focuses on the aggregation and integration of data frommultiple sources, usually for analysis and reporting purposes.Many fields in Big Data focus on the extraction of information. For example, BusinessIntelligence (BI) systems focus on providing historical, current, and predictive views for thebusiness making use of it. Often, BI and related systems manage their data in the form of datacubes, which are multi-dimensional views of data managed and modeled in a way for rapid queryand analysis. Online analytical processing, or OLAP, is an important part of BI systems thatfocuses on creating views and queries from data cubes for
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
validate understanding of the conceptsthey have learned during the course of their studies and for instructors to measure theachievement of established learning goals. As with many computer engineering programs,students of the computer engineering program at Utah Valley University complete their degreeprograms with a semester long capstone design experience. The intent is for students to utilizecompetencies developed in the first three years of the curriculum in the solution of an embeddeddesign problem.Embedded SystemsAn Embedded system is any mechanical or electrical system that is controlled by a computerworking as part of an overall system6. Embedded systems is one of the most dynamic and fastgrowing areas in industry. These systems continue
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Shaundra Bryant Daily, Clemson University; Juan E Gilbert, Clemson University; Wanda Eugene, University of North Carolina Charlotte; Christina Gardner-McCune, Clemson University; Kyla Alanna McMullen, Clemson University; Phillip Wendell Hall Jr, Clemson University ; Sekou L Remy, Division of Human Centered Computing - School of Computing, Clemson University; Damon Lamar Woodard, Clemson University; Tania Roy, Clemson University
Tagged Divisions
Computing & Information Technology
country. The Human-CenteredComputing (HCC) PhD program at Georgia Institute of Technology has a particular focuson human-computer interaction (HCI), learning sciences and technology (LST), cognitivescience, artificial intelligence (AI), robotics, software engineering and information security.Students must complete three core classes that include Introduction to Human CenteredComputing, Prototyping Interactive Systems, and Issues in Human Centered Computing. Theymust also take 9 credit hours in an area of HCC specialization, and 9 credit hours in a minor oftheir choosing outside of courses offered by the college. The curriculum was designed to providestudents with depth and breadth of knowledge in HCC areas. Similarly, in the HCC PhD degreeprogram
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Jessica Richards, BYU; Joseph J Ekstrom, Brigham Young University
Tagged Divisions
Computing & Information Technology
. Semantic “dissonance”, in the forms of synonymy and polysemy, is frequentlyencountered between participants in related meetings and discussions.Unfortunately the topic of semantic miscommunication is usually not broached until it causes aproject meltdown. This laissez-faire approach can be compared to an information securitymanager ignoring potential virus threats until a machine is already infected.Taking a more practical stance towards the problem, we developed the Termediator software topre-emptively identify potential term dissonance. Termediator has evolved since 2010 from asimple term browser to a multifaceted tool; in its current state it integrates similarity measures insynonymy with topic modeling and clustering in polysemy.The
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Secil Caskurlu, Purdue University; Iryna Ashby, Purdue University; Marisa Exter, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
the most emphasized courses. All participants considered these courses to be relevant to gain fundamental knowledgeon how computers function in order to see the big picture of software development. For instance,one of the participants mentioned that his program designed the curriculum to prepare theirgraduates for professional life: I hope all of our courses are getting our students ready [for] professional life. We’ve design the curriculum to make sure our students are prepared for the workforce, and by all accounts we’ve got 90% of our students without an internship get internships, our students have very high placement rates, and very high salaries for our college, and really for Purdue. The only product
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Michael Tamir; Ronald S Harichandran P.E., University of New Haven; Lueny Morell, InnovaHiEd
Tagged Divisions
Computing & Information Technology
attract a more diverse student body. At present,engineering in Western countries is an overwhelmingly male-dominated field. GalvanizeU/UNHaims to help reverse this trend, as well as support a greater number of students from differentbackgrounds, by offering scholarships from partner organizations with similar goals. Another of GalvanizeU/UNH’s core goals is to create a new path for how data scienceeducation is perceived and taught. To train a new class of data scientists, educators mustemphasize problem solving and design thinking over tools and technology. Its curriculum modelfeatures needs/competency-based, learner-centric and project-based instructional strategies, andincludes opportunities for industry partnerships and continuous
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mahmoud K. Quweider, University of Texas - Rio Grande Valley; Fitratullah Khan, University of Texas - Rio Grande Valley
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
course major module objectives and module sub-objectives, in particular, those that are relevant to CBI implementation. 2. Identifying expected difficulties: What are the difficulties that students face when taking the course? 3. Real-world context: Why is the course an important part of the CS curriculum, and where can one find its applications? 4. Knowledge model: What is the conceptual model for the course, including prerequisites, course dependencies, and course level? What concepts and techniques should be considered to enhance understanding of the material? 5. Assessment of learning: How does one change the traditional testing and assessment methods to make sure these include formative assessment
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology; Reneta Davina Lansiquot, New York City College of Technology
Tagged Divisions
Computing & Information Technology
. (2008). High-impact educational practices. Washington, D.C.: AAC&U.[8] Johnson-Laird, P. N. (1983). Mental models. Cambridge: Cambridge University Press.[9] Lansiquot, R. D., & Cabo, C. (2015). Strategies to integrate writing in problem-solving courses: Promoting learning transfer in an interdisciplinary context. In Proceedings of the 122nd American Society for Engineering Education Annual Conference. Washington, DC: ASEE.[10] Lansiquot, R., & Cabo, C. (2014). Strengthening the narrative of computing with learning communities. In Proceedings of World Conference on Educational Media and Technology 2014. Chesapeake, VA: AACE.[11] Lansiquot, R. D., & Cabo, C. (2011). Alice’s adventures in programming narratives. In C
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Rob Elliott, Purdue University School of Engineering and Technology, Indiana University Purdue University at Indianapolis
Tagged Divisions
Computing & Information Technology
regardless of how much of the reading you did.” “The flipped classroom was a great idea that allows college students to be college students. They have the responsibility to be prepared for class which allows the teacher to then build on what they should have already learned or have an idea about, which removes lecturing, something students tend to ignore anyway.” “It was great! The video lectures were a great resource. Wish I had this in every class!” “I felt that the flipped classroom was very helpful and a lot better than taking the class online.”Students also provided some feedback toward improving the flipped classroom and its place inthe curriculum: “I really liked the flipped classroom
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Wei Zheng, Jackson State University; Jianjun Yin, Jackson State University; Yanhua Cao, Jackson State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Paper ID #13967Implementation and Outcomes of Scaffolding Cyber-Enabled CollaborativeLearning in Multiple STEM CoursesProf. Wei Zheng, Jackson State University Dr. Wei Zheng is an associate professor of Civil Engineering at Jackson State University. He received his Ph.D. in Civil Engineering from University of Wisconsin-Madison in 2001 and has over ten years of industrial experience. Since becoming a faculty member at JSU in 2005, he has made continuous efforts to integrate emerging technologies and cognitive skill development into engineering curriculum.Mr. Yanhua Cao, Jackson State University Yanhua Cao is an doctoral
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Joshua Levi Weese, Kansas State University; Russell Feldhausen, Kansas State University; Nathan H. Bean
Tagged Divisions
Computing & Information Technology
://www.youtube.com/channel/UCmY2tPu6TZMqHHNPj2QPwUQ28. Savery, J. R. (2009). Overview of problem-based learning: Definitions and Distinctions. Interdisciplinary Journal of Problem based Learning, 1(1), 269-282.29. Sengupta, P., Kinnebrew, J. S., Biswas, G., & Clark, D. (2013). Integrating computational thinking with K- 12 science education using agent-based computation: A theoretical framework. Education and Information Technologies, 18(2), 351-380.30. Spradling, C., Linville, D., Rogers, M., & Clark, J. (2015). Are MOOCs an appropriate pedagogy for training K-12 teachers computer science concepts? Computing Sciences in Colleges, 30(5), 115-125.31. Weintrop, D., & Wilensky, D. (2015). Using Commutative Assessments
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Joseph Idziorek, Iowa State University; Mark F. Tannian, Iowa State University; Douglas W. Jacobson, Iowa State University
Tagged Divisions
Computing & Information Technology
exceptions, Facebook friend requests, andoffers for free items, but lack the proper knowledge and comprehension to evaluate the benefitsand consequences of taking specific action on these items.As educators and computer security practitioners, we feel that the task of providing universitystudents with the opportunity to become knowledgeable about the malicious side of the Internetfalls squarely upon our shoulders. It has long been recognized that there exists an urgent need toimprove security education1. Although this is clearly true in computing technology curriculums,the direct benefits of security-focused courses at the undergraduate level are not presentlyaccessible to non-computing majors. Realistically, computer security involves much more
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Tanner Lund, Brigham Young University; Hayden Panike; Samuel Moses, Brigham Young University; Dale C Rowe, Brigham Young University; Joseph J Ekstrom, Brigham Young University
Tagged Divisions
Computing & Information Technology
practical data mining system includes: data sources, a shipper, a broker, an indexer,searchable storage, and an interface. Each piece serves as a crucial part of an integral system. Apiece of data enters the system directly from the data source, or a shipper, from which point it isplaced in a broker. The indexer pulls the data from the broker, and the data is parsed and placedinto the searchable storage. The interface then accesses the storage through API calls. Thissame basic concept is used by most data mining implementations.Let us begin with our data sources. Data sources can be anything that produces text-basedevents. Common log sources include: servers, workstations, printers, and network equipment(such as wireless access points or routers
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Stephen J. Zilora, Rochester Institute of Technology (CAST); Jim Leone
Tagged Divisions
Computing & Information Technology
looming deadlines draw near. In 1989 while at the Software EngineeringInstitute of Carnegie Mellon University, Watts Humphrey introduced the notion of the CapabilityMaturity Model to describe the state that existed in software development organizations. Itincludes the concepts of “levels” of maturity and “key process areas.” Many organizations haveadopted this model now referred to as CMMI (Capability Maturity Model Integration) and usedit to guide their maturation process. It is a framework that allows an appropriate, matureapproach to software development to become part of the organization’s culture. Marchewka9introduced the concept of “Assurance of Learning” coupled with CMM, a focus similar to thatproposed by the authors. In that work, the
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, University of Detroit Mercy; Jiawen Wang, University of Detroit Mercy; Wenbing Zhao, Cleveland State University; Lei Wang, Anhui Polytechnic University
Tagged Divisions
Computing & Information Technology
helping students to learn ROS efficiently and meaningfully in the real world of engineeringprojects. Preliminary assessment of this multi-lab-driven learning method for providing roboticseducation supports its effectiveness.1. IntroductionWith the continued advances in autonomous robotics over the several decades, it is becomingincreasingly vital that the development of a new curriculum on Robot Operating System (ROS)in a university be well aligned to technology advancements and applications [1,2,15]. The ROShas drawn attention from the field of robotics over the last several years [15]. The primaryobjective of ROS is to provide an open source, configurable, and unified programmingframework utilized for controlling robots in a variety of
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Camilo Vieira, Eafit; Alejandra J. Magana, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
Paper ID #6378Colombian Elementary Students’ Performance and Perceptions of Comput-ing Learning Activities with ScratchMr. Camilo Vieira, Eafit Master of Engineering from Universidad Eafit. Doctoral student in Computer and Information Technology at Purdue University. Research interests include Computing Education, Computational Thinking and Educational Technologies.Dr. Alejandra J. Magana, Purdue University, West Lafayette is an Assistant Professor at the Department of Computer and Information Technology at Purdue Univer- sity West Lafayette. Magana’s research interests are centered on the integration of
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tian Qiu, Purdue University; Mengshi Feng, Purdue University; Sitian Lu, Purdue University; Zhuofan Li; Yudi Wu; Carla B. Zoltowski, Purdue University; Yung-Hsiang Lu, Purdue University
Tagged Divisions
Computing & Information Technology
the vice president of Purdue Billiards Club since 2015.Mr. Zhuofan LiMr. Yudi WuDr. Carla B. Zoltowski, Purdue University Carla B. Zoltowski is an assistant professor of engineering practice in the Schools of Electrical and Com- puter Engineering and (by courtesy) Engineering Education at Purdue University. She holds a B.S.E.E., M.S.E.E., and Ph.D. in Engineering Education, all from Purdue. Prior to this she was Co-Director of the EPICS Program at Purdue where she was responsible for developing curriculum and assessment tools and overseeing the research efforts within EPICS. Her academic and research interests include the profes- sional formation of engineers, diversity and inclusion in engineering, human-centered
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Emre Tokgoz, Quinnipiac University
Tagged Divisions
Computing & Information Technology
. Page 26.1614.2Choosing the best programming language to start teaching high school and undergraduate studentsis observed by several researchers; see for example Ali (2007), Duke (2000), Giangrande (2007),Goosen (2004), Goosen (2008), Mannila (2006), and Tharp 1982. Some other researchers focusedon learning preferences of students to solve engineering problems; see for example Felder andSilverman (1988) and Rosati (1998). Education of various technologies in various engineeringfields as a part of an undergraduate curriculum is discussed by researchers such as Clough (2002)and Maase & High (2008). Stockwell (2002) focused on Computer Science majors’ mathematicsproblem solving skills when C programming language is used in the classroom. This
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Vicky L. Smith, Indiana University Purdue University, Indianapolis; Eugenia Fernandez, Indiana University Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
teaching at too fast a pace. In addition, many students felt that theylacked suitable preparation through prior experience, particularly in programming skills anddatabase concepts. 2,3,5,6A few studies found that the students’ ability to integrate into the academic and socialenvironment of the university played an important role in retention.3 The most important factorin this integration was building a peer group support system through peer interaction in theclassroom.5,7,8 In addition, student-faculty relationships were also very important to academicintegration. Students had to feel comfortable interacting with faculty members.2,8 However,Weng et al. found that self-efficacy, or the ability to persist in the face of obstacles, was moreimportant
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
learners to integrate software testing and other qualityassurance concepts into their programming skills.This paper is organized into four sections. WReST-CyLE will be introduced in Section 2.Afterwards, gamification design architecture used in WReSTT tool will be presented inSection 3. Following that section, class study and assessment results will be presented inSection 4. Conclusions and future works will be discussed in Section 5.WReSTT-CyLE – A Cyber Enabled Software Testing Learning EnvironmentWReSTT, the initial repository, was an online software testing repository which iscontained with learning materials about software testing tools only. This project was acollaborative effort between Florida International University (FIU) and Florida A
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Lorri J Barnett, Purdue Polytechnic, Anderson; Dennis O. Owen, Purdue University
Tagged Divisions
Computing & Information Technology
, manage, and improve operations. Skills Include: Systems Integration Planning RFP Development/Grant Writing Technical management including software development, system administration , telecommunications Professional Development Process Re-engineering Disaster Recovery End User Training ERP Design/Implementation IT Manage- ment Project Management Solution Engineering Systems SupportProf. Dennis O. Owen, Purdue University Dennis Owen is an Associate Professor of Computer and Information Technology at Purdue University. His primary teaching interests include application development and computer hardware. He is active in recruiting and curriculum transformation. c American Society for
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Eric John Wilson; Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
, computer, and bioengineering students at an undergraduate level before they encounter digital signal processing and its applications in junior or senior level courses.  The Fourier transform takes a signal in time domain, switches it into the frequency domain, and vice versa. Fourier Transforms are extensively used in engineering and science in a vast and wide variety of fields including concentrations in acoustics, digital signal processing, image processing, geophysical processing, wavelet theory, and optics and astronomy. The Discrete Fourier Transform (DFT) is an essential digital signal processing tool that is highly desirable if the integral form of the Fourier Transform cannot be expressed as a mathematical equation