Asee peer logo
Displaying results 61 - 90 of 237 in total
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alexander A. Kist, University of Southern Queensland
Tagged Divisions
Computing & Information Technology
specific.Internet Access and the National Broadband NetworkThe Australian National Broadband Network aims to deliver “super-fast broadband” to 100% ofAustralian homes. The Government owned NBN Co has been tasked to “…deliver Australia'sfirst national wholesale-only, open access broadband network to all Australians, regardless ofwhere they live”2. The project aims to connect 93% of premises using Fibre to the Home (FTTH)technology and the remaining 7% of premises using terrestrial fixed wireless or satellite wirelesstechnology. Providing a national broadband network and particularly FTTH will have a majorimpact on education, health, business, government service delivery and many other areas.19 Table 1: Internet Access Options
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Gregory Stuart Rogers; Preston Jay Mendoza, National University
Tagged Divisions
Computing & Information Technology
user. The system is based on a normalized, extensible SQL (Structured QueryLanguage) compliant data model able to generate or provide the relevant data to support thegeneration of reports in a more flexible and open way. It uses an SQL based database whichallows the traceable evolution of both the schema and the content data. Some light transactionalsemantics introduced to the system to trace and follow changes to the database over time andsecure the data at multiple levels at the user, database, OS and network levels. It was greatlearning experience for students and exposure as well a chance to test their abilities.1. IntroductionScripps Mercy Physician Partners is a physician business organization and medical group withan 8-year track record
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alex Pantaleev, State University of New York, Oswego; Adrian Ieta, State University of New York, Oswego; Carolina C. Ilie, State University of New York, Oswego
Tagged Divisions
Computing & Information Technology
assess the method on three courses by applying and analyzingthe results of a uniform exit survey distributed to all students involved. We demonstrate positiveCS student perceptions of the methodology and similar JiTT-related student responses in thethree courses. The method appears effective in increasing student ability and willingness to workindependently whether in introductory or advanced courses.1. INTRODUCTIONWe describe an experiment that compares the use of the Just-in-Time Teaching (JiTT) [1]methodology in a high level Computer Science course with its use in two introductory Physicscourses at a middle-sized Liberal Arts university. We examine student perceptions of this newmethod across the three courses involved in the experiment. JiTT
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Frank Jordan Sheen, Brigham Young University; Dale C. Rowe Ph.D., Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
available include:standards and guidelines for security analysis and development, and simulation environments forexperiential training. We recommend a framework be developed to further incorporate thismodel.IntroductionLarge scale, real-time embedded systems are used to support many industrial systems, includingcritical infrastructure such as those used for electrical supply[1] and water utilities[2], and arecommonly called Software Control and Data Acquisition (SCADA) systems. The purpose ofusing SCADA in critical infrastructures “is to allow operators to monitor and control systems”and to ease workload and management[3]. The architecture of these systems can consist of vastarrays of components. In some cases, SCADA systems are large enough to
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Tokunbo Ogunfunmi, Santa Clara University
Tagged Divisions
Computing & Information Technology
IEEE CASS Technical Committee on Circuits and Systems for Education Outreach (CASEO). He obtained his B.S.E.E. (first class honors) from University of Ife, Nigeria, and M.S. and Ph.D. in electrical engineering from Stanford University. Page 25.960.1 c American Society for Engineering Education, 2012 Multimedia Systems Education Innovations: Part 1(Speech)AbstractMultimedia Systems is becoming very important in undergraduate education.The word multimedia refers to speech, audio and video data.Speech, audio and video and general digital signal processing (DSP) devices are verycommon-place
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; James R. Lewis, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
as an element in your UI layout, such as a buttons,images, text labels etc. In contrast to Apple’s iPhone, Android’s UI builder is fairly inefficientand probably the only way to get around is to code all of the UIs directly into the XML. HoweverI noticed that integrated Java-Doc and content seem to truly facilitate the path to learn anunfamiliar API.Arrays in Java are data structures consisting of related data items of the same type. Arrays can beconsidered as fixed-length entities, although at times an array reference with proper syntax maybe reassigned to a new array of a different length. On the other hand we have dynamic datastructures, 1 such as stacks, queues, trees and lists that can shrink or grow as programs execute.Android also
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona; David Layton, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
, and if a student failsto finish his or her part, this failure will not affect the entire project. Students from differentlocations are able to participate in the design and mock interview.In this paper, the result of the authors’ finding in this field, new requirements andrecommendations for teaching the senior projects course online will be discussed. Differenttechniques such as web conferencing and group interviewing are employed to replace physicalinteraction.1-IntroductionOnline learning or e-learning has become an increasingly common choice for many peoplepursuing education. A Yahoo search with the keyword “senior projects” will result in more thanten thousand hits, and perhaps all refer to onsite teaching of this course. A search of
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Naser El-Bathy P.E., North Carolina A&T State University; Clay Samuel Gloster Jr., North Carolina A&T State University; Ghassan M. Azar; Cameron Seay, North Carolina A&T State Univeristy; Mohammed K. El-Bathy, Lawrence Technological University; Ibraheem A. Kateeb, North Carolina A&T State University; Rajeev K. Agrawal, North Carolina A&T State University; Aiman Ghassan Baset
Tagged Divisions
Computing & Information Technology
each cluster to each other, as ifthey were points in an n-dimensional space is used as our “quality” for each cluster. In an n-dimensional space, n is the number of words in each document.The following math is used to find D, the average distance between the documents in the ithcluster of set C of clusters. (1) (2) (3)The variable P is used to hold the Cartesian product of the set of documents in the cluster withitself, creating a set of pairs of
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Tanya Stanko P.E., Innopolis University; Oksana Zhirosh, Unium
Tagged Divisions
Computing & Information Technology
entering ITcareers, students of IT specialties, and IT professionals. Figure 1 shows the diagram ofgroups of stakeholders involved in the survey.The respondents were asked to grade the importance of IT competencies on the scale: 1 -Not Important, 2 – Moderately Important, 3 – Important, 4 – Highly Important, 5 –Essential.In addition to the online anonymous survey we conducted a set of interviews withselected representatives from each group.The questionnaire has been split into three blocks: 1. Information about current occupation and work experience 2. Grading IT competencies 3. Information on gender, age group, country of birth, country of study, and country of current occupationRespondents were not allowed to start grading IT
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Namratha Siripragada, Northern Illinois University
Tagged Divisions
Computing & Information Technology
for administrative and student levels of access. When offering theremote laboratory, a large volume of data is collected for experience sampling method and weeklysurvey. An evaluation scheme was implemented to assess the effectiveness of the system as wellthe students’ learning outcomes. In-built capability to collect systems’ operational data and weeklysurvey are used to evaluate the effectiveness of the system, while pre- and post-tests are utilized tomeasure the student learning outcomes.1. IntroductionOne of the major limitations of distance-learning programs is their failure to deliver the laboratoryrelated courses.1, 2 For distance learning programs, students currently have to visit a campus toperform the laboratory sessions or
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Vicky L. Smith, Indiana University Purdue University, Indianapolis; Eugenia Fernandez, Indiana University Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
CIT courses. In addition, a significant relationship was shown betweenretention and grade point average (GPA), the number of completed credit hours, and the numberof attempted credit hours in the second semester. The results of this study illustrate the need forthe faculty to focus their efforts towards providing outstanding instructors for, and maintaining ahigh quality curriculum in, first year CIT courses.IntroductionRetaining students is a challenge at any university. Educators are trying to determine whichfactors may impact a student’s decision to remain in his or her program of study. A majorinitiative is being undertaken at Indiana University Purdue University Indianapolis (IUPUI) toimprove student retention in all fields.1 The
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, NASA; Mohd Abdelgadir Khairi, Najran University
Tagged Divisions
Computing & Information Technology
“thus part of the operational fabric of an IT environment” [3].Operational risk such as Denial of Service (DoS) could be mitigated by using CDMwhich has centralized place to enforce security [3]. CDM is a dedicated system that storesa golden version of master data. In operational uses using the CDM approach, the masterdata published to downstream systems while source systems (upstream) maintainsovereignty to manage and own data.CDM Approach – consolidation approach – viewed in analytical use cases, clean andconsistent master data published to data warehouse and BI applications [12]. In addition,[1] states that the CDM transcends operational and analytical use and into globalgovernance on data management throughout the enterprise. Shankar and
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
David M. Whittinghill, Purdue University, West Lafayette; Jacob Samuel Brown, Purdue University
Tagged Divisions
Computing & Information Technology
; Kinect; behavior modificationIntroductionCerebral palsy (CP) is a chronic movement and muscle disorder whose onset begins in childhoodand persists for the duration of an individual’s life 23, 25. Though there is not a cure for the disease,physical therapy (PT), particularly when applied to the upper extremities, has been shown toameliorate some CP symptoms 1, 18. Despite the demonstrated effectiveness of PT, patientadherence to therapy is problematic, as patients tend only to maintain their regimen whileactively enrolled in a therapy program 2. The reasons for the lack of compliance are multi-factored and not completely understood 29. This lack of adherence has been observed to be evenworse in pediatric CP patients 4, 6, 20. This results not
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manaz Rusi Taleyarkhan, Purdue University; Oluwatosin Alabi, Purdue University, West Lafayette; Alejandra J. Magana, Purdue University, West Lafayette; Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
that allow them to collaborate and atthe same time share resources such as data and tools. Technologies that can support theseprocesses are internet-based science gateways defined as “technological innovations whose aimis to bring about a radical transformation in research” 1. Such science gateways are also calledcyberinfrastructure or e-science 1. Cyberinfrastructure is considered to be the basis for dynamicclusters of individuals, organizations, and resources such as computational tools and services,which enable flexibility, security and collaboration among their users 2,3. The George E. Brown,Jr. Network for Earthquake Engineering Simulation (NEES) operates a cyberinfrastructure(centered on the NEEShub accessible at nees.org) for research
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Rob Elliott, Purdue University School of Engineering and Technology, Indiana University Purdue University at Indianapolis
Tagged Divisions
Computing & Information Technology
to infuse recorded coursematerials and automated assessment into a traditional classroom-based course. In short theflipped classroom asks students to interact with course material prior to coming to the classroomso that face-to-face time can be used for active learning [1, 2]. Flipping provides students earlierexposure to course topics in order to give them a common vocabulary and fundamentalknowledge to be immediately applied in inquiry-based learning activities.This study describes the student attitudes of the flipped classroom, as measured by anonymoussurvey data collected at the start, midpoint, and end of the semester. The course examined in thestudy is a sophomore-level computer systems analysis and design from the fall semester of
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University (ENG); Charles Richard Cole, Southern Polytechnic State University; Christopher Welty, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
collaborative potential with the Game Design and Development stu-dents and instructors.The Perspective of Gaming The game development program at our university is taught as an applied form of comput-er science. In addition to requiring several “core” computer science courses, students are re-quired to complete 14 courses that are specific to game development and gaming algorithms. Asa culmination of this coursework, students are required to complete a two-semester sequence ofstudio and capstone courses in which they exercise their design and development skills throughthe implementation a full game prototype. Students self-organize into groups, which typicallyrange in size from 1 to 3 members. Groups are encouraged to pursue the genre of gaming
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jane LeClair, National Cybersecurity Institute at Excelsior College; Denise Pheils, National Cybersecurity Institute
Tagged Divisions
Computing & Information Technology
could have had their data stolen. The bombshell news sent the value of Target stockinto decline with an immediate drop of 2%. Finkle (2013)6 noted that “Target's shares closeddown 2.2 percent at $62.15 on the New York Stock Exchange on Thursday afternoon”. Analystsnoted that “The timing of the [Target] news is particularly bad, said MKM Partners analystPatrick McKeever. It’s right in front of the Saturday before Christmas, the biggest day of theyear for many retailers. We do think there could be some negative impact to [quarterly] sales,and there will very likely be a cost, both in dollars and in management time [and] attention.”(Cheng, 2013)1 The investigation of the Target breach is just beginning, but by all accounts itcould have a serious
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Norman Pestaina, Florida International University; Tiana Solis, Florida International University; Peter J. Clarke, Florida International Univeristy
Tagged Divisions
Computing & Information Technology
national accrediting agencies. A critical part of theassessment process is the generation of useful data for analysis and evaluation yielding indicatorsfor program improvement. Senior year capstone projects are a fertile source of such data. In thispaper, we outline the Student Outcomes and Senior Project course of the BS-CS program atFlorida International University (FIU). We describe and evaluate a methodology used to performassessment of attainment of the BS-CS Student Outcomes using data from the Senior Projectcourse.1. IntroductionUndergraduate program assessment continues to be a significant undertaking in manyinstitutions. It is the critical component of the continuous improvement process, and may providestakeholders with some confidence in
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Quan Do, New Mexico State University; Rajeev K. Agrawal, North Carolina A&T State University; Dhana Rao; Venkat N Gudivada, Marshall University
Tagged Divisions
Computing & Information Technology
for assessing students’ SQL learning. SQL concepts are modeled using RDFS. The user can select SQL concepts to be included in an assessment and our approach will generate appropriate queries. The proposed approach is generic and is database metadata driven. A Web-based prototype system is developed to illustrate the effectiveness of the proposed approach.1. Introduction and MotivationAutomatic question generation is an active area of research. Its practical applications are many,especially in the context of learning assessment. In both online and traditional face-to-facecourses, learning outcomes are used as standards for measuring and comparing performance andachievement of learners. In a broader context, outcomes-based
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Brian Joseph Lane
Tagged Divisions
Computing & Information Technology
the front of the vehicle; when the sonar detects an object it stops, reverses, rotates to theleft, and continues at half speed for one second and then returns to full speed again. Thevehicle has a track configuration for many types of terrain. Setting 1 starts with the tracks in Page 24.234.2the lowered position for smooth terrain while input is taken from the sonar. Setting 2 has thetracks in a raised position for rough terrain with input also taken from the sonar. Setting 3starts out with the tracks in a raised position and takes input from the accelerometer mountedto the vehicle. The vehicle then adjusts the tracks left, right, up, or down
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, NASA; Mohd A. Khairi, Najran University
Tagged Divisions
Computing & Information Technology
-OrientedArchitecture (SOA), and Software as a Service (SaaS) has prompted a great deal of interest inMaster Data Management (MDM). The recent emphasis on regulatory compliance, SOA, andmergers and acquisitions has made the creating and maintaining of accurate and complete masterdata a business imperative” (p. 1).Enterprise Data Management, an IT discipline, is composed of a set of tools and processes todefine enterprise data entities of an organization. Enterprise data management objectives are to Page 24.266.2organize and manage the organization’s enterprise data. This paper focused on the twoarchitectural models, Centralized and Federated, for enterprise data
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Jimmy Faraon, National University
Tagged Divisions
Computing & Information Technology
rates offered Page 24.277.2can be converted into monthly usage depending on the length of time that can beafforded. For our case study we choose four cloud vendors: (1) Rackspace Cloud, (2)GoGrid, (3) Amazon Web Service, and (4) HP Cloud Service (HPCS). Each of them hasvariable options in pricing due to their economic outlook and the nature of the cloudbusiness. Final cost will also be depended on the customers’ preference on how theywould like to utilize operate and the cost management.2.1. RackspaceRackspace is an Infrastructure-as-a-Service (IaaS) cloud company provider that basedtheir design on the idea that we still need a traditional data
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy
Tagged Divisions
Computing & Information Technology
4730 Embedded Systems • CS 3400 Software Engineering Page 24.306.6 • CS 3520 Database Theory • CS 3670 Network Programming • CS 4470 Artificial Intelligence • CS 4510 Operating Systems DesignTo summarize, the students in the Computer Engineering area of specialization take 36 hours ofgeneral education, 13 hours of Science, 20 hours of Math, 39 hours of computer science, 18hours of engineering requirements, and 15 hours of electives.Table 1 summarizes the curriculum comparison of the Computer Engineering Program andComputer Engineering Area of Specialization in the Computer Science
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Seyed Mousavinezhad, Idaho State University; R. Eugene Stuffle, Idaho State University; Wei Pan, Idaho State University; Steven Grant Maclure, Idaho State University
Tagged Divisions
Computing & Information Technology
represent time. f(x,y) is a two-dimensional signal(e.g., image) of variables x and y. In digital signal processing we study discrete-time ordigital signals which can be obtained by sampling a continuous-time (analog) signal. Forthe purpose of discussion in this paper we will follow the notation in reference 1 and usex[n] to represent a digital signal x(nT) where T = 1/Fs is the sampling period (interval)and Fs is the sampling frequency. It is important to distinguish the difference between adiscrete-time signal and a digital one (again for more information we ask readers toconsult reference 1.)One important area in SP is the design/analysis of filters, this is also the topic whichstudents find usually more mathematically challenging. Basically a
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Cory Brozina, Virginia Tech; David B. Knight, Virginia Tech Department of Engineering Education
Tagged Divisions
Computing & Information Technology
university semester lasts 15 weeks, andthe enrolled MOOCs encompassed a total of 16 weeks.Three courses were chosen from the Coursera platform that fit the graduate student’s researchinterests as well as his learning needs. The first course, Computing for Data Analysis, began onSeptember 23rd and lasted for four weeks with a noted workload of approximately three to fivehours per week: 1) Computing for Data Analysis—Roger Peng—Johns Hopkins University https://www.coursera.org/course/compdata “This course is about learning the fundamental computing skills necessary for effective data analysis. You will learn to program in R and to use R for reading data, writing functions, making informative graphs, and applying modern
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Janusz Zalewski, Florida Gulf Coast University; Andrew J. Kornecki, Embry-Riddle Aeronautical Univ., Daytona Beach; Bogdan Denny Czejdo, Fayetteville State University; Fernando Garcia Gonzalez, Florida Gulf Coast University; Nary Subramanian, University of Texas, Tyler; Dawid Trawczynski, Advanced Micro Devices
Tagged Divisions
Computing & Information Technology
embeddedsystems security. The topics selected in the first round include: (1) General educational moduleson security, such as “General Introduction to Computer Security”, “Introduction toCryptography” and “Embedded Systems Security”; (2) Security of specific technologies used inembedded systems, which in this edition involve “FPGA Security”, “RFID Security” and“SCADA Security”; and (3) Software aspects of embedded systems security, such as “JavaSecurity” and “Threat Modeling.” Each module includes the following components: Objectives, Introduction, Student Activitiescomposed of Suggested Readings and Hands-on Exercise, and Assessment. Eight modulesdeveloped thus far have been tested in undergraduate courses on embedded systems andcomputer networks at
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manghui Tu, Purdue University Calumet; Kimberly Lynn Spoa-Harty, Purdue University Calumet Graduate Student
Tagged Divisions
Computing & Information Technology
incident identification, tracking, andreconstruction are discussed.1. IntroductionThe advances in internet technologies, the proliferation of mobile devices, and the developmentof electronic healthcare records, have driven healthcare services online and ubiquitous to provideconvenience and flexibility to users and patients14, 31. However, due to the untrustworthy internetenvironment and sophisticated healthcare service and business processes involved, healthcaresector faces severe challenges on securing protected healthcare information9, 10, 12, 14, 31. Over thepast few years, millions of sensitive data records in healthcare and other private and publicsectors were exposed10, 12, 14, 20, 24 and has resulted in substantial financial and
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Osvaldo Mangual, Honeywell Aerospace; Marvi Teixeira, Polytechnic University of Puerto Rico; Reynaldo Lopez-Roig, Polytechnic University of Puerto Rico; Felix Javier Nevarez-Ayala, Polytechnic University of Puerto Rico
Tagged Divisions
Computing & Information Technology
mixed-mode (MPI-OpenMP) parallel implementation, including performance and scalability studies, carried out inour 16-node, 64 processor cluster.Based on the prime factor decomposition of the signal length this algorithm, which is based on ablock diagonal factorization of the circulant matrices, breaks a one-dimensional cyclicconvolution into shorter cyclic sub-convolutions. The subsections can be processed,independently, either in serial or parallel mode. The only requirement is that the signal length, N,admits at least an integer, r0, as a factor; N = r0.s. The Argawal-Cooley Cyclic Convolutionalgorithm, has a similar capability but requires that the signal length can be factored intomutually prime factors; N = r0.s with (r0,s) = 1. Since the
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Ge Jin, Purdue University Calumet (College of Technology); Gerald A. Dekker Jr., Purdue University Calumet; John Moreland, Purdue University Calumet; Barbara Jean Nicolai, Purdue University Calumet
Tagged Divisions
Computing & Information Technology
, the Katrina hurricane along the GulfCoast of the United States in 2005, the earthquake in Haiti in 2010, or the most recentlyearthquake and tsunami in Japan. From the White House report on Hurricane Katrina, the stateand local government should develop modern, flexible and transparent logistic system forstockpiling commodities and supplies during the emergency [1]. Improvements in emergencymanagement information and decisions will have a positive impact on those most affected by thedisaster – the affected population. The affected population, however, can create difficulties forthe decision-maker. Each has varying disaster-caused or exacerbated needs and varied demandsfor services from the response organizations. With a general perception of
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
MD B. Sarder, University of Southern Mississippi
Tagged Divisions
Computing & Information Technology
Page 24.760.2members without revealing information to other groups.IntroductionAs students learning is widely accepted as key metric of student success, increased attention isbeing paid to the tools and techniques best suited to its successful adoption in classroomenvironment. It is very evident that technology seems to offer a natural and accessible way toadvance students learning [1]. ECAR has surveyed undergraduate students annually since 2004about technology in higher education and found that more and more students are using latesteducation technology in their education [2]. On an average student to computer ratio of 4:1 and ateacher and student population ready, willing and able to use technology (Figure 1). Yet despiteits availability