the authenticity of the VM templates and how do we protect VM templates from beingmanipulated? If cryptophytic approach is applied, how long will it take to authenticate VMtemplates? This article studied related work and proposed a cryptography based solution toauthenticate VM templates. Real virtual machine templates of different sizes were used tomeasure the performance of different approaches. The results show that a PKI-like strongauthentication approach is not unacceptable to be used in real cloud computing environment.This study is derived from a security course project. Students learned the basics of cryptographyand began to apply their knowledge in a real world setting. The study provides insights andbenefits for both the cloud
) embedded assessment strategies; and e) scaffolds. These features provide anengaging laboratory experience, work with students’ pre-existing knowledge, and develop skillsof self-monitoring and reflection, which contribute toward improving the quality of STEMeducation. The project experimentation part of the facility has two major components: a) aremote laboratory and b) pedagogical design.3.1 Remote LaboratoryThis implementation proceeds through a number of inter-linked tasks covering a range ofdisciplines, which include computer interfacing, web design, interactive graphical user interface,computer networking, network/web security, experiment module designs, assessment strategy,and project evaluation.The developed facility can be presented by a
for Medicare and Medicaid Services(CMS), the national health spending in the United States in 2008 was estimated to be $2.4 trilliondollars19. The cost of heart disease and stroke takes around $394 billion19. Consequently, the UShealth care system is facing daunting future challenges. The current situation is likely to worsen Page 23.200.2with the first baby boomers reaching retirement age in the next decade. For the first time, theelderly are expected to outnumber the young, not only in the United States but worldwide.1Throughout the world, the over age 65 population is projected to more than double from 357million in 1990 to 761 million by
designed for undergraduates which focuses on understanding how toprocess speech signals. We provide examples of the curriculum, what is covered and howwe cover it. We also provide examples of laboratory projects that are used to complementthe class lecture sessions. We use MATLAB software in all the lab projects.We also discuss possible implementations of the speech coding and processing usinghardware such as DSPs. In the future, we plan to introduce the use of FPGAs for thisapplication as well.The paper is divided into five sections. In Section 2, we start with the discussion ofSystems and DSP curriculum improvement. In Section 3, we give some details of theMultimedia Systems I: Speech course. In Section 4, we present a sample course projecton
and computer hardware in their datacenters which result in environmental concerns), health care, and inequality in search amongdifferent segments of the society (see a list of reference papers used in the seminar from thecourse website2).While a course project in a typical web search engine course for computer science majors wouldbe a team programming project to build a simple search engine, the main student wok in thisfoundation seminar consists of various reading and writing assignments. The writingassignments helped students reflect on what they learn in the seminar. The assignments also areused to meet the writing goal for the foundation seminar. Two types of writing assignment areused in the seminar. One is the weekly reading journal
Paper ID #15358Leveraging Online Lab Development: A New Paradigm to Offer EducationalLab Infrastructure as a Cloud ServiceDanilo Garbi Zutin, Carinthia University of Applied Sciences Danilo G. Zutin is currently a Senior Researcher and team member of the Center of Competence in Online Laboratories and Open Learning (CCOL) at the Carinthia University of Applied Sciences (CUAS), Vil- lach, Austria, where he has been engaged in projects for the development of online laboratories, softtware architectures for online laboratories and online engineering in general. Danilo is author or co-author of more than 30 scientific papers
then, many of them have already left the field. It is hypothesized that thislack of clarity of the field at an early point in students’ academic career, coupled with theperception that the curriculum is largely irrelevant to their lives, has impacted the retention ratesof computer science majors in the first two years of their academic study programs. This paperwill report on a preliminary stage of a comprehensive project effort that aims to improveretention rates for computer science students in their entry-level courses through thedevelopment of course modules intended for inclusion in their entry-level curriculum. Thetheoretical basis for these modules will be reviewed and the design framework for thedevelopment of these models is discussed
Paper ID #10954Gamification of Physical Therapy for the Treatment of Pediatric CerebralPalsy: A Pilot Study Examining Player PreferencesDr. David M Whittinghill, Purdue University, West Lafayette Dr. David Whittinghill is an Assistant Professor of Computer Graphics Technology and Computer and Information Technology. Dr. Whittinghill’ s research focuses on simulation, gaming and computer pro- gramming and how these technologies can more effectively address outstanding issues in health, educa- tion, and society in general. Dr. Whittinghill leads projects in pediatric physical therapy, sustainable energy simulation, phobia
machines efficiently. From 2008, westarted experimenting with new centralized virtual lab automation systems, specifically VirtualComputing Lab (VCL) which was used in several projects that year. The next year VMware(vCenter) Lab Manager (VLM), another virtual lab automation package, was made available inselected courses.Our VCL infrastructure was supported by 84 IBM HS21 blade servers, each with two Intel dual-core Xeon processors and 12 GB memory. 1 TB Network-attached storage (NAS) was available Page 22.856.4for students to save their work. In contrast, the VLM system was supported by a total of six LS22blade servers with each blade consisting of
accepted classification scale.Evidence - Collection Evidence, such as student homework, exams, projects, and presentations, as well ascourse syllabi and lecture notes, were collected from faculty and students. The evidence wasscanned and stored electronically in class specific folders within a departmentally sharedprogram assessment folder on the local network.SOMs - Analysis The maximum Bloom’s level found in the SOM for each of the student outcomes,without regard for the course objectives was used as a target in assessment of all student workfor each course. It was assumed that if the maximum Bloom’s level was achieved, the lowerlevels were also achieved.Evidence – Analysis A comprehensive understanding of the evidence
needsThe administration of a large wiki textbook project is demanding, encompassing aspects oftopic selection, communication, role and responsibility assignment, assessment andmonitoring. 1. Signup sheet. Only a limited number of students or teams must be allowed to select any particular topic, to assure that all the topics will be chosen by somebody. Passing around a signup sheet in class means that some students get first choice because of where they sit in the classroom. Using standard software tools for this task—shared spreadsheets or message boards, for example—is unreliable, since these tools don’t have any way of preventing “too many” students or teams from signing up for a
Paper ID #15901Android-Based Remote Robot Control SystemDr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several publications regarding to the research and educational projects.Mr. Md Hossain Shuvo, Alabama A&M University Graduate Student, Dept. of
Paper ID #5951Evaluating Online Tutorials for Data Structures and Algorithms CoursesDr. Simin Hall, Virginia Tech Dr. Simin Hall is a Research Assistant professor in the Department of Mechanical Engineering (ME) at Virginia Tech (VT). Currently she is collaborating with Dr. Cliff Shaffer in Computer Science Department on a National Science Foundation funded TUES project to improve instruction in Data Structures and Al- gorithms (DSA) courses. Her applied research in education is in cognitive functioning using online learn- ing technologies. She has redesigned two undergraduate courses in Thermodynamics for online
entity.To address this issue it is important to develop training programs that can be a source oftrained maintenance technician for remote experiment facilities. Page 22.1002.4f) Administrative awareness and support: Another major drawback for the remoteexperimentation area is the lack of administrative awareness about the potential of this area.Not many leaders of academic community and administrators in academic institutions realizethe potential of Internet accessible remote laboratories. This is a major limitation for thesustainability issue of this area. In most of the cases, projects on remote laboratories arefunded by national and regional
South Africa,specifically targeting hotels and restaurants. “PoS RAM Scraper Malware - Past, Present, andFuture” 5 includes in-depth specifics on Dexter’s operations. Three additional reportsdemonstrate the impact Dexter has had, as well as some specifics to its character. These reportsare “ASERT Threat Intelligence Brief 2014-3 Dexter and Project Hook Point of Sale MalwareActivity Update Point of Sale Malware Overview PoS Malware Activity : Dexter and ProjectHook” 8, “Visa Data Security Alert - Dexter Malware Targeting Point-of-Sale (POS) Systems” 9,and “Dexter and Project Hook Break the Bank - Inside Recent Point-of-Sale Malware CampaignActivities” 10.The research methodology will consist of a comparative study of the articles listed above
containing boilerplate code that does not add pedagogical value. Participants canfree their mind from gory details and focus on the specific aspect that matters. Second, weprovide scripts to automate repetitive steps, such as launching tracing experiments. Third,the instruction document serves also as a report template, thus allowing students to writefindings while performing the activity. This document is part of a paperless grading process,and is returned annotated. Because the setup is well established, we can afford to reviewtheir code and provide valuable feedback.3.1 Session 1: Introduction to conceptsStudents have programmed a robot on an embedded board as assignment in a previoussemester project course. We take advantage of this prior
/absence of or to the extentof which that sub category was used ranging from zero to three. Repenning et al. measuredstudent’s learning of CT as patterns rather than concepts using Agent Sheets11. This led to anautomatic analysis tool using latent semantics to determine student growth in CT. Recently,the same group created a system entitled Real-Time Evaluation and Assessment ofComputational Thinking (REACT), a real-time assessment tool allowing teachers to getimmediate feedback on what students are struggling with or where they are succeeding2.Seiter developed the Progression of Early Computational Thinking model (PECT)20. ThePECT model combined evidence of programming concepts in Scratch projects with levels ofproficiency (basic, developing, and
Diego, CA. She teaches courses in design engineering, engineering management, and data analytics. Prior to academia, she worked for almost ten years as a quality control manager, engineering project manager, and senior scientist responsible for failure analysis of thin film materials. She invented new quality control tools and supervised interns from local universities and community colleges as part of a $5.0 million technical workforce development initiative funded by New York State. She has pub- lished diverse articles on topics ranging from engineering education to high temperature superconductors and has spoken at many national and international conferences. Her doctorate in materials science and engineering are
Research Triangle Park Evaluators, an American Evaluation Association affiliate organization and is a member of the Amer- ican Educational Research Association and American Evaluation Association, in addition to ASEE. Dr. Brawner is also an Extension Services Consultant for the National Center for Women in Information Technology (NCWIT) and, in that role, advises computer science departments on diversifying their un- dergraduate student population. She currently serves as the principal evaluator for the Teachers Attracting Girls to Computer Science project which aims to increase and diversify the student population studying computer science in high school. Dr. Brawner previously served as principal evaluator of the NSF
Paper ID #16453Attracting Students to Programming via Physical ComputingProf. Alka R Harriger, Purdue University, West Lafayette Alka Harriger joined the faculty of the Computer and Information Technology Department (CIT) in 1982 and is currently a Professor of CIT. For the majority of that time, she has been actively involved in teaching software development courses. From 2008-2014, she led the NSF-ITEST funded SPIRIT (Surprising Possibilities Imagined and Realized through Information Technology) project. Since October 2013, she has been co-leading with Prof. Brad Harriger the NSF-ITEST funded TECHFIT (Teaching
preparedcybersecurity workforce to defend IT infrastructure and fight against cybercrimes. It’s projectedthat the US is in an urgent demand of thousands of information security workers. The NationalScience Foundation has established a number of grants to award projects that promotecybersecurity education and curriculum development. Some of these projects have reportedsuccess of teaching hands-on skills through Gamification, a game-like learning environment.CTF (Capture-the-Flag) events are particularly successful in attracting college students, evenfrom non-IT/CS major and high school students into cybersecurity. This paper summarizes thecurrent popular Gamification technologies and the practice of using CTF and competitionprojects in classroom
Society for Engineering Education (ASEE).Dr. Mohd Abdelgadir Khairi, Najran University I, Mohamed Khairi, my bachelor degree in computer science. I did my Masters in system science from University of Ottawa, Canada. My PH.D was in ”Master Data Management” from University of Phoenix. I have over 20 years of experience in IT industry - ten of them with Microsoft in Redmond, WA. Currently I’m assistant professor at University of Najran. In addition of teaching and Research I’m coordinator of graduation projects and field training for computer and information system college.Jinan Ziade, University of Phoenix My name is Jinan Ziade. Currently a Doctoral student, ABD, at University of Phoenix working on my doctorate of
teaching skills. In the following sections severalhomework will be explained. The author used these homework in his courses.(a)-Microprocessors Course.LabVIEW has a module called Elemental IO. With the use of this module and a microcontroller, Page 24.842.4several concepts in the microprocessors course could be implemented. In one of the homeworkstudents asked to write a program in LabVIEW to implemented Etch-a-Sketch on StellarisLM3S8962 Evaluation Kit with ARM processor. The classic Etch-A-Sketch toy project, taughtstudent how to control OLED display of the microcontroller. Following displays front and part ofblock diagram portion of this
member as well as a project leader on the Image and Video Content Search Team of the Computing Technology Lab until 2007. He is now an associate professor in the Department of Computer Engineering of Myongji University. His research interests include digital content (image, video, and music) analysis and management, fast image search and indexing, color adaptation, 4D, sensors, VR, and multimedia standardization. He serves as a project editor of International Standards, that is, ISO/IEC 23005-3, 23005-4, 23005-5, and 23005-7. Page 24.850.1 c American Society for Engineering Education
American Society for Engineering Education (ASEE), serving as the past Program Chair for the Minorities in En- gineering Division. He has served as a chair, vice-chair, program chair, and program committee member for numerous conferences of ASEE.Dr. Mohd Abdelgadir Khairi, Najran University I, Mohamed Khairi, my bachelor degree in computer science. I did my Masters in system science from University of Ottawa, Canada. My PH.D was in ”Master Data Management” from University of Phoenix. I have over 20 years of experience in IT industry - ten of them with Microsoft in Redmond, WA. Currently I’m assistant professor at University of Najran. In addition of teaching and Research I’m coordinator of graduation projects and
engineering and automation, industrial faultdiagnosis, linguistics, material science, music, and physics6.Educational excellence requires exposing students to the current edge of research. To ensure thatstudent projects are along the same trajectory that the industry is moving, educators mustcontinually introduce emerging techniques, practices, and applications into the curriculum. Thefield of computational intelligence is growing rapidly. It is essential that the emerging field ofcomputing intelligence be integrated into the computer science and engineering curriculums.This paper is a study of different approaches that are used by different institutions of highereducation around the world to integrate computing intelligence concepts in their
completed at the Centre for Advanced Technology in Telecommunications (CATT), RMIT University, Melbourne, Australia. From 2004 to 2006, he was a Postdoctoral Research Fellow with the Australian Telecommu- nications Cooperative Research Centre (ATcrc) and RMIT University, Melbourne, Australia. From 2005, he was the ATcrc networking program Project Leader. Since May 2006, he is a lecturer and since Jan. 2011, a Senior Lecturer in telecommunications at the University of Southern Queensland, Toowoomba, Australia. His research interests include green IT, teletraffic engineering, performance modelling, QoS provisioning, and engineering education. He is a member of the Telecommunication Society of Australia, Engineers
AC 2012-3306: ISPR: AN INFORMATION SYSTEM FOR PHYSICIANSRESOURCESDr. Mudasser Fraz Wyne, National University Mudasser Fraz Wyne is currently serving as a professor of computer science and Chair of Department of Computer Science, Information, and Media Systems at the School of Engineering, Technology, and Me- dia, National University, San Diego, Calif., USA. He is a lead faculty member for the B.S. in information systems and previously for M.Sc. in database administration and M.Sc. in computer science programs. Wyne has a Ph.D. in computer science, a M.Sc. in engineering, and a B.Sc., in electrical engineering. He has been in academics for 20+ years and supervised more than 50 graduate and undergraduate projects
curricula.Through joint efforts of the University of California at Berkeley and the College of the Atlantic,was carried for environmental monitoring. Joint efforts between Harvard University, theUniversity of New Hampshire, and the University of North Carolina have led to the deploymentof a wireless sensor network to monitor eruptions at Volcán Tungurahua, an active volcano in Page 23.1244.10central Ecuador.Just as they can be used to monitor nature, sensor networks can likewise be used to monitorhuman behavior. In the Smart Kindergarten project at UCLA, wirelessly-networked, sensor-enhanced toys and other classroom objects supervise the learning process
Page 26.10.21 IntroductionRetina is a light-sensitive layer of tissue (Figure 1), located at the inner surfaceof the eye. The optics of the eye creates an image on the retina, similar tothe film in a camera. Light striking the retina activates nerve impulses. Thesepulses are sent to various parts of the brain through the optic nerve. Retinascans require that the person removes their glasses, place their eye close tothe scanner. A retinal scan involves the use of a low-intensity coherent lightsource, which is projected onto the retina . A retina scan cannot be faked andit is impossible to forge a human retina. Furthermore, the retina of a deceasedperson decays too rapidly to be used to deceive a retinal scan [17, 18]. Therecognition of a