Asee peer logo
Displaying results 91 - 120 of 126 in total
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing & Information Technology
convert the result of their research project to apaper and submit it to a conference for presentation and publication. One problem that Ifeel I need to mention is the travel expense for the student to the conference. To solve thisproblem, usually the students can sign up for a few hours of volunteer work at theconference and get their registration fee waved. Sometimes, the students are willing topay for a big part of the travel expenses because this trip becomes a vacation for themwhile securing a publication for their resume.In order to enrich the content of this data mining course, the plan is for two weeks ofteaching sequence mining be added to the content of this course. This gives the studentsome experience with mining such a complex data
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mayari I. Serrano, Purdue University, West Lafayette; Alejandra J. Magana, Purdue University, West Lafayette; Baijian Yang, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
introduce students to the problem.It has to be written in a way that leads students to define the problem by themselves. Thestudents must then generate a plan of action that has to be followed to meet the client’srequirements. The problem-solving process obliges the team to go through numerous iterations,and test and review solutions in order to come up with a model that will address the client needs[10] . Similarly, teamwork is essential in MEAs due to the time available to come up with a viablesolution to the problem. Additionally, by requiring multiple point-of-views and perspectives,students can arrive to better solutions in less time [10].A Cybersecurity Themed Model-Eliciting ActivityThis paper presents an MEA called Migration to HTTPS
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Danilo Garbi Zutin, Carinthia University of Applied Sciences; Michael E. Auer, Carinthia University of Applied Sciences
Tagged Divisions
Computing & Information Technology
. We have been studying the possibilities and themost suitable technologies available to implement this. A potential candidate areWebSockets13, as described in RFC 6455 due to the support for a bidirectional full-duplexcommunication channel that could be used to convey messages to the experiment engines7.We would like to highlight that the solution presented by this work is a tool for laboratorydevelopers or laboratory owners that plan to or already host online laboratories. Thesestakeholders are usually specialists on the lab domain and not software engineers. The toolspresented here are, however, transparent for other stakeholders such as students, instructorsand teachers. It is not the focus of this work to provide any guidelines or
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
john pickard, East Carolina University; Te-shun Chou, East Carolina University; Philip J Lunsford II P.E., East Carolina University; John Spence
Tagged Divisions
Computing & Information Technology
to help build the pool of IPv6 talent through high quality, certified IPv6 courses.The IPv6 Security course is the second in a series of three IPv6 courses we plan to deliver atECU. In summer 2012, we delivered an IPv6 Fundamental course which met with great success.In summer 2013, we will offer both the IPv6 Fundamentals course and the newly developed IPv6Security course. During the 2013 Summer Semester, we will solicit student feedback on theneed for a third course that will cover “advanced” service provider centric IPv6 topics. We willalso continue to work with the Nephos6 academy to develop academic curriculum tocomplement the courses and the lab assignments.Bibliography1. Brustoloni, C. 2006 Laboratory Experiments for Network
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
networking. After graduation, Sanati-Mehrizy plans to attend medical school.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of the Computing Sciences Department at Utah Valley University, Orem, Utah. He received his M.S. and Ph.D. in computer science from the University of Oklahoma, Norman, Okla. His research focuses on diverse areas, such as database design, data structures, artificial intelligence, robotics, computer integrated manufacturing, data mining, data warehousing, and machine learning. Page 25.823.1 c American Society for Engineering
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Quan Do, New Mexico State University; Rajeev K. Agrawal, North Carolina A&T State University; Dhana Rao; Venkat N Gudivada, Marshall University
Tagged Divisions
Computing & Information Technology
. Page 24.221.9Our future research direction is multifold. First, we will implement the strategy design pattern sothat our system can work with databases which are managed by MySQL, Oracle, and MicrosoftSQL Server. The second one involves generating natural language description of an autogenerated SQL query using textual generation algorithms. Third, we plan to extend the approachto generate multiple choice questions. Fourth, we will measure the effect of the Web-basedsystem on student learning by having control and experimental groups.References [1] ABET, Inc. www.abet.org/index.aspx, August 2013. Last checked: 5 August 2013. [2] M. Al-Yahya. OntoQue: A question generation engine for educational assesment based on domain ontologies. In
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy
Tagged Divisions
Computing & Information Technology
-oriented society, some researchers 4,5,6, haveargued that the development of autonomous learners is fundamental. Coto describes autonomyas: … the ability to take charge of one’s own learning. It means to have the responsibility for setting learning goals; identifying and developing learning strategies; developing study plans; reflecting on learning; identifying and selecting relevant resources and support; and assessing one’s own progress7.In a research study conducted at the National University of Costa Rica with the goal ofproducing a curriculum shift from a teacher-centered approach toward a student-centeredapproach, it was concluded that this shift is not going to be an easy one. They pointed out theimportance of
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Jeongkyu Lee, University of Bridgeport; Omar Abuzaghleh, University of Bridgeport
Tagged Divisions
Computing & Information Technology
Table/Index No Application Cluster Everything management Partitioning MySQL Cluster7 Shared Nothing Parallel plan User defined Yes partitioningAs shown in Table 2, MySQL cluster is the only Parallel and Distributed DBMS that supportFedora Core Operating System. Therefore, we installed MySQL cluster 7.0.13 on Fedora Core 12Linux. In addition, since MySQL Cluster employs shared nothing architecture, each node owns itsmemory and storage area for the instance. MySQL cluster has three different nodes: (1)management nodes: manage the entire distributed database in the cluster, (2) SQL nodes:coordinate SQL query requests, and (3
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Tao Xing, Tuskegee University; Legand L. Burge Jr., Tuskegee University; Heshmat A. Aglan, Tuskegee University
Tagged Divisions
Computing & Information Technology
Blackboard Inc. helped the instructor to set upusernames and passwords for all students and resolved some technical problems on downloadingand running BML on different platforms since students’ personal mobile devices differsignificantly from each other. Before the instructor gave each lecture, he informed students onany updates on the BML and help students to resolve any problems they may have. Studentswent through the BML materials with the instructor together in class briefly. Students can accessthe electronic lecture notes, announcements, syllabus, and assignments with due dates. Due tothe difficulties of setting up the mobile technology environment, other functions in the BMLwere not used but planned for the Spring semester of 2011.Evaluation
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Jason St. John, Purdue University, West Lafayette; Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
virtual HPC cluster • Hands-on experience in virtualization, cloud computing technologies, and networking • Introduction to MPI (message passing interface) 3 , high performance LINPACK (HPL) 21 , and HPC system schedulers like TORQUE 18 • Students exposed to an IaaS tool via OpenNebula • Students gain experience in planning, designing, building, and benchmarking deployed VMs within each student’s virtual HPC cluster6 Our ApproachEach student was assigned 16 recycled computer lab desktop computers and a recycled monitorfrom Purdue University’s IT department, a commodity Gigabit Ethernet network switch, a fewcarts to store the computers and monitor on, and a number of other peripherals and cablesrequired to use the equipment. Each
Conference Session
Emerging Information Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Erin Shaw, University of Southern California; Michael Crowley, University of Southern California; Jaebong Yoo, University of Southern California; Hao Xu, University of Southern California; Jihie Kim, University of Southern California
Tagged Divisions
Computing & Information Technology
support social and collaborative graph annotation tofacilitate data understanding by social scientists and intelligence analysts. Each of thesecommunities desired to understand data from their unique perspectives, and came to anunderstanding based on the underlying flexibility of the tools. However, sophisticated dataanalysis tools are expensive and instructional needs are unique to each class. Moreover, becauseof the instructor’s unique relationship with the course data, we felt it was important to usecurrent and authentic data. We do, however, plan to interview different instructors about thissame data in the future, and so will be looking at this issue in more depth.ConclusionsThe Pedagogical Workflows team has been developing graphs to
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Afsaneh Minaie, Utah Valley University; Ruhul H. Kuddus, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai
Tagged Divisions
Computing & Information Technology
work atthe conference and get their registration fee waved. Sometimes, the students are willingto pay for a big part of the travel expenses because this trip becomes a vacation for themand also get a publication for their resume.In order to enrich the content of this data mining course, the plan is that two weeks ofteaching sequence mining to be added to the content of this course. This gives the studenta considerable experience with mining such a complex data type that has applications inalmost any field.ConclusionSequence data mining has multitude of potential applications in diverse disciplines, fromaviation safety to health care and from student management to consumer behaviormanagement. Careful observation and deductive reasoning may
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Abdulwaheed Johnson, Pace University; Anthony Joseph, Pace University
Tagged Divisions
Computing & Information Technology
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reneta Davina Lansiquot, New York City College of Technology; Ashwin Satyanarayana, New York City College of Technology; Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
an intention “to offer players a chance to immerse themselves in a fantasy RPG [role-playing video game] that has a compelling plot while experiencing the classical game-play system that has endeared itself to the hearts of thousands of gamers in their childhood.” The hardware items needed to properly run the proposed game, such as specific memory requirements, graphics, and sound cards, are also presented here. • Project Description: Narrative of project design, flowchart (CS1); review of relevant literature, pseudocode (CS0); concept map and storyboards (EG1). A step-by-step plan of how students plan to implement their game in Alice is the main component of this section. This includes
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tian Qiu, Purdue University; Mengshi Feng, Purdue University; Sitian Lu, Purdue University; Zhuofan Li; Yudi Wu; Carla B. Zoltowski, Purdue University; Yung-Hsiang Lu, Purdue University
Tagged Divisions
Computing & Information Technology
identifier or expression not found”, “UndeclaredVariables”, and “Pointer error”. The first two errors can be summarized as “students writingcodes without a plan” [16]. The third error is the gap between understanding pointers andtheir types. It is observed that some students tried to cast types of understanding the implica-tions. Their programs could pass compilation but had run-time failures. Compilation Error Percentage of total errors Expected identifier or expression not found 23.5% Undeclared Variables 20.8% Pointer error 17.2% Not used Variables
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, Florida Institute of Technology; Mohd Abdelgadir Khairi, Najran University; Jinan Ziade
Tagged Divisions
Computing & Information Technology
Multiple-Entity types such as customers, accounts, products, and vendors;2) User types and usage scenarios such as analysis and reporting; 3) Data governance andadministration features and capabilities; 4) Support for unstructured data and search capabilitiesfor it at enterprise level; 5) Support Centralized or decentralized repositories; 6) Ease to deploy;and 7) Pre-built Domain Data Model. Security and privacy considerations: Security and privacy are crucial in MDMarchitecture and one must take security considerations into account in MDM implementation.Dreibelbis [3] discussed the considerations of security related in MDM implementation: First,Policy is part of general data governance plan. The privacy and security policies are the rules
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Smitesh Bakrania, Rowan University; Brad Joseph Johnson, Rowan University
Tagged Divisions
Computing & Information Technology
assignment exercise during a relatively busy period of the term.With the planned refinements to the assignment algorithm, the solution promises to become arobust platform for future iterations of the overall project assignment process. Page 26.20.12References1. Kadlowec, J., Bhatia, K., Chandrupatla, T.R., Chen, J.C., Constans, E., Hartman, H., Marchese, A.J., von Lockette, P., Zhang, H., "Design Integrated in the Mechanical Engineering Curriculum: Assessment of the Engineering Clinics" Journal of Mechanical Design 129.7 (2007): 682-691.2. Von Lockette, P., Riddell, W., Dahm, K., Harvey, R., Courtney, J., Pietrucha, B., Diao, C., Accini
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy; Reza Sanati-Mehrizy, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
,”There’s Plenty of Room at the Bottom”, Engineering and Science, 23(5): 22-36, 1960. 4. Mongillo, John, “Nanotechnology 101”, Greenwood Press, 2007. Page 26.1183.13 5. Roco, Mihail C. , Chad A. Mirkin, and Mark C. Hersam, “Nanotechnology Research Directions for Societal Needs in 2020: Summary of International Study”, Springer, 2011.6. Greenberg, A. “Integrating Nanoscience into the Classroom: Perspectives on Nanoscience Education Projects”, ACS Nano, Vol.3, No. 4, 2009, pp. 762-769.7. The National Nanotechnology Initiative – Strategic Plan, December 2007.8. Veety, E., et al., “Multidisciplinary Undergraduate Minor
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2015 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Annie Y. Patrick, East Carolina University; Dustin Stocks
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
and data compiled by special tools built by 6Lab are used to analyze data relatingto IPv6 adoption. The 6Lab program segments world IPv6 adoption into four phases: planning,core network, content, and users. By all four phases, global IPv6 adoption is rapidly increasing.Planning - Measured by looking at the number of IPv6 prefix allocations from the RIRs and howmany of these allocated prefixes show up in Internet routing tables. By measuring the number ofallocated IPv6 prefixes, it is possible to get an indicator of future IPv6 deployments. All threeprefixes (Allocated IPv6 Prefixes – dashed line, Routable IPv6 Prefixes-dotted line, and AliveAllocated IPv6 Prefixes-solid line) exhibit an increasing trend (Figure 1
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
James Lohse, Holladay Labs; Reza Sanati-Mehrizy, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing & Information Technology
group of data scientists who hopeto make Utah a leading area of data mining, predictive analytics and machine learning. This area is aprime location for the research proposed in this paper because it hosts many call centers fromcompanies as diverse as Visa, NuSkin, Adobe, EMC, Bluehost, Domo and several contract call centers.Between the University of Utah, Brigham Young University and Utah Valley University, there is acritical mass of all levels of university students studying machine learning and data mining. Not only isthere a data mining focus at Utah Valley University, the University of Utah also has a program andinfrastructure specializing in Data Management.18The plan being proposed here is to approach these companies to determine who is
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Munish Sharma, Northern Illinois University
Tagged Divisions
Computing & Information Technology
with anintegrated learning management system. The first part of the paper provides a description of thedevelopment process of remote laboratory, while the second part details the LMS that is beingused to facilitate the remote laboratory. In addition, the LMS provides a means of monitoringand analyzing the usage of the facility through different web applications. Effort has been madeto use cutting edge technologies to maximize the benefits of modern technologies throughout thedevelopment process. The lead author is planning to deploy the developed system by offering alaboratory course over the Internet. Once completed, the authors will be able to share theexperience in the future.AcknowledgementThe authors would like to thank the National
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
this tracker, students were exposed to a system that dynamically builds a 3Dmap of the physical environment. As of this writing, 13th Lab plans on releasing a Unity pluginwithin the next few days. Though there were clearly similarities across all the trackingtechnology, by providing multiple examples of trackers, we were able to have meaningfuleducational discussions about the affordances of each of the trackers, comparing and contrastingbetween them as they were introduced.Two Example ProjectsIn order to provide a better understanding of the kind of projects that were developed, twostudent examples are briefly presented. The projects both use the Vuforia SDK (likely due to theorder that the trackers were introduced as well as online support
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Shaundra Bryant Daily, Clemson University; Juan E Gilbert, Clemson University; Wanda Eugene, University of North Carolina Charlotte; Christina Gardner-McCune, Clemson University; Kyla Alanna McMullen, Clemson University; Phillip Wendell Hall Jr, Clemson University ; Sekou L Remy, Division of Human Centered Computing - School of Computing, Clemson University; Damon Lamar Woodard, Clemson University; Tania Roy, Clemson University
Tagged Divisions
Computing & Information Technology
leaveswomen feeling like outsiders. This perception is further exacerbated by the lack of role modelsand mentors to help women themselves as part of the computing community.    While many of these causes continue to be problematic, this section offered several opportunitiesthat may be available to the field of computing to increase women’s interest, enrollment, andretention in the field. On a systemic level, we have highlighted the need for better mentorship forcurrent female students and faculty to make them want to stay in the field and become rolemodels to future students. Research also suggests that there needs to be more strategicrecruitment plans that combat the stereotypes of computing and encourage women to participateby supporting current
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
goal/plan analysis of buggy Pascal programs. In Soloway, E., & Spohrer, J. C. (Eds.), Studying the Novice Programmer (pp. 355–399). Hillsdale, NJ: Lawrence Erlbaum. doi:10.1207/s15327051hci0102_4[17] Soloway, E., and Spohrer, J. C. (Eds.). 1989. Studying the novice programmer. Hillsdale, NJ: Lawrence Erlbaum.[18] Winslow, L. E. 1996. Programming pedagogy–A psychological overview. SIGCSE Bulletin 28(3), 17–22. doi:10.1145/234867.234872 Page 24.1280.12
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
and end users—indicate they are using a wireless mesh protocol for at least some of their wireless field devices,and 20% are only using wireless mesh systems. Over half of the WSN adopters are using energyharvesting for at least a few wireless sensor nodes, and 9% use energy harvesting to power themajority of their wireless field devices.Compared with ON World’s previous survey in 2010, data reliability has dropped to only abouttwo-thirds as much of a concern compared with the previous 2010 survey. Costs, battery life, andstandards confusion are ranked slightly higher as inhibitors in our current survey compared withthe previous survey6. Seventy percent of end users indicate they are planning WSN or additionalapplications.Looking forward
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tamer Omar, East Carolina University; Philip J. Lunsford II, East Carolina University
Tagged Divisions
Computing & Information Technology
ofinstructional contents is planned in our future work. References 1. Almatrafi, O., Khondkar, I., & Aditya, J. (2015). An Empirical Study of Face-to-Face and Distance Learning Sections of a Core Telecommunication course. American Sociaty of Engineering Education. Seatle, WA. 2. Li, P., Jones, J. M., & Augustus, K. K. (2011). Incorporating Virtual Lab Automation Systems in IT Education. American Society for Engineering Education. 3. May, D., Terkowsky, C., & Ortelt, T. R. (2016). Using and Evaluating Remote Labs in Transnational Online Courses for Mechanical Engineering Students. American Society for Engineering Education. 4. Saliah-Hassane, H., Saad, M., Ofosu, W. K., djibo, k., Mayaki, H. A., & Amadou
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Emil H Salib, James Madison University; Ryan Lutz, James Madison University
Tagged Divisions
Computing & Information Technology
is advertised for networking across multiple ESXi hosts, it turns out to be anincomplete solution, overkill for meeting our needs and requires license fee beyond the availablefunding to the project.Another major issue that we faced in planning the migration from the VMware Workstation to thevSphere environment was that we were no longer able to take advantage of the physical Ethernetport built into the client machine. Initially, we thought the problem could be resolved through theuse of vSphere Web Client Integration Plug-in. The Web Client Integration Plug-in allows someof the physical devices (such CD/DVD Drive and USDB ports) on the client machine (used toaccess VMs) to be passed through to the user’s VMs. Unfortunately, after consulting
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Northwest Missouri State University; Eugene Vasserman, Kansas State University; Eleanor C Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
issues?”Based on interview responses, it was apparent that there was student interest to further pursuecybersecurity in various ways (additional courses, performing research, and seeking jobs). Mostof the students we interviewed considered cybersecurity to be a component of their overall Page 26.496.4education and career plans, but not the main focus. By the end of the semester, all students wereglad they had taken the course. While there were a few students who had one or two topics theydid not like, interest rates ranged from somewhat interesting to very exciting. When asked, mostindicated they would be willing to take additional cybersecurity
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology; Reneta Davina Lansiquot, New York City College of Technology
Tagged Divisions
Computing & Information Technology
. Wankel & R. Hinrichs (Eds.), Transforming virtual learning: Cutting-edge technologies in higher education (Vol. 4, pp. 311- 331). Bingley, UK: Emerald.[12] Lansiquot, R., & Cabo, C. (2010). The narrative of computing. In Proceedings of World Conference on Educational Media and Technology 2010 (pp. 3655-3660). Chesapeake, VA: AACE.[13] Lansiquot, R. D., Satyanarayana, A., & Cabo, C. (2014). Using interdisciplinary game-based learning to develop problem solving and writing skills. In Proceedings of the 121st ASEE Annual Conference. Washington, DC: ASEE.[14] Rist, R. S. (1995). Program structure and design. Cognitive Science, 19, 507-562.[15] Spohrer, J. C., Soloway, E., & Pope, E. (1989). A goal/plan analysis of
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University; Nelson Barnes Jr, Alabama A&M University
Tagged Divisions
Computing & Information Technology
Yes Testing def and uses and how to perform all uses testing. LO#7. All Def- Give an introduction to the definition of 7 5 No Uses path testing def and uses and how to perform all uses testing. LO#8. Statement Give an introduction to the definition of 5 5 No Coverage coverage. Others Mobile app testing techniques and tools 10 10 No (Android and iOS). Proceedings of the 2016 ASEE Annual Conference Other than the developed learning objects (LOs) and those being developed, shown inTable 1, we plan to develop more learning