, see, for example, [1]) whenever we are dealing with alternating current(AC) topics students are being introduced to simple forms of frequency selective structures. Asexample, in first order circuits (RC or RL) if we include AC excitations we are really dealingwith filters: low-pass, high-pass, band-pass or band-stop (reject) devices. These simple circuitsare examples of passive circuits & systems. With the introduction of operational amplifiers (Op-Amps) integrated circuits, we start description of so-called active filters. Studying theinput/output (I/O) models of these systems, students are gradually introduced to using computer-aided design, CAD, or analysis tools that can be beneficial in their work. For example after“digitizing” the
Cybersecurity education.IntroductionPrepared cybersecurity workforce is necessary to fight against cyber-treats and preserve thecountry sovereignty [1]. It is estimated the workforce shortage in the U.S. public sector alone wasabout 20,000 - 30,000 per year. This shortage is both one of quantity and quality. “We not onlyhave a shortage of the highly technically skilled people required to operate and support systemswe have already deployed, we also face an even more desperate shortage of people who candesign secure systems, write safe computer code, and create the ever more sophisticated toolsneeded to prevent, detect, mitigate, and reconstitute systems after an attack” [2]. The Evans andReeder report notes that it is the consensus of the Commission
well as differential equations (which is a co-requisite.) Since Matlab/Mathcadprograms are available in our computer laboratory, these are used throughout the course. Thetextbook by Kamen & Heck [1] is used for the course and students can access the accompanyingtextbook website. It should be noted that some class examples use both Mathcad and Matlab butthe textbook uses Matlab only. In our program we also have a senior-level elective course onfilters using the software tool called WFilter accompanying the textbook [2]. As engineeringeducators teaching undergraduate, first year graduate courses we are all aware that these toolsshould be used at the right time, right place to help student understanding and learning. Usuallya problem is
, and the visual-spatial sketchpad.1 Sweller’s work in CLT also played an influential role inthe development of Mayer’s cognitive theory of multimedia learning, which provides insight intothe ways in which content and presentation style can overload students’ limited working memorycapacity.1 Cognitive overload is specific to the individual, and recent research suggests that oneof the main features of this overload involves the individual’s prior knowledge base.3Understanding human cognitive architecture allows for greater instructional efficacy. Specifically, the instructional delivery of course materials should differ for novice andexpert learners in order to maximize learning.1 Typically, novices are in need of morescaffolding, due to
classroom setting. This makes it challenging forstudents to become self-directed learners after graduation. This study provides an overview ofthe design and development of several self-directed learning modules, along with theimplementation procedure and analysis of the preliminary results.IntroductionWith the current pace the technological advancements are achieved today, it became necessaryfor recent college graduates to keep themselves up-to-date with all the innovations andtechnological advancements.1, 2 Especially for engineering, engineering technology, andcomputer science majors, self-improvement and continuous learning after graduation became anexpectation. The concept of continuous learning can present a challenge for many recentgraduates
c American Society for Engineering Education, 2015 1 Data Management Model Selection: IT Professionals’ preferences Gholam Ali Shaykhian, Ph.D. Mohamed Abdelgadir Khairi, Ph.D. Jinan Ziade, ABDAbstractData Management Models selection (Centralized Data Model or Federated Data Model)for managing organization data is influenced by many factors. The goal is to determinethe best architectural model for managing enterprise data; and help organizations to selectan architectural model. The study compared and contrasted the federated and centralizeddata models within
Systems he worked with Cisco customers designing and deploying core Internet designs and technologies. In 2005 Mr. Smith earned a master’s degree in Computer Science from Colorado State and 1 year later left industry to teach engineering at Oklahoma Christian University. Mr. Smith’s emphasis is in first year student success, mentoring young engineers, and data communications. He consistently scores well in student feedback and enjoys regular strong relationships with his students and classes. c American Society for Engineering Education, 2016Developing an Android-based Layer 3 Switch as a senior projectAbstractA project-based course has been designed with a goal of developing an in-depth
features, we use feature vector with low dimension. We employ SupportVector Machine (SVM) for the classifier with the gait-based feature vector. The extracted featuredataset are divided into two parts, i.e., training and testing datasets. The training data set areused for training a SVM classifier while the testing dataset are used for the evaluation.According to the experimental results, we know that GEI is an applicable feature for human gaitrepresentation. Despite of the limitation of the dataset, e.g., different races and thickness ofclothes which weaken the distinct differences between males and females, the average accuracyof the proposed approach reaches up to 87% under 10 times holdout validation.1. IntroductionGender classification plays
program’s goal has been to provide a quality program thatmeets accreditation standards while providing the students with a skill set that allows them tosucceed in computing careers. The curriculum content for the Computer Science degree is basedon the 2008 ACM Curriculum Report. The Computer Science degree at UVU is accredited byAccreditation Board for Engineering and Technology (ABET) in 2002 and currently has morethan 850 students. The program also has an advisory board comprised of representatives of localindustry who assist in aligning the program to industry needs and helping to acquire industrysupport and resources.Table 1 and 2 shows the enrollment and graduation trends in the Computer Science program. Ascan be seen from the tables, the
module presentation and labparticipation.1. IntroductionCyber-security continues to move to the forefront of existing and new technology deployments,as well as the media in general. Recent attacks1,2 by terrorist groups on critical infrastructure arebeginning to exploit the risks and vulnerabilities of Industrial Control Systems (ICS)3,4. APresidential Executive Order has brought priority to the issue5 and Presidential Directive 76defines such critical infrastructure sectors, the vast majority of which are controlled by ICS.Therefore, there remains a critical need to educate students in the concepts of cyber-security withrespect to such systems, and to be inclusive of students not only in disciplines specializing incyber-security, such as
. Most young kids and even some college students seem tobe unaware of what computer science means. These activities help them understand the depthand diversity a computer science undergraduate degree can entail.The paper will provide the details for each of these activities and the learning objectives. Theactivities included are:(1) Binary, Octal, and Hexadecimal Initial Keychains(2) Understanding Variables and Arrays with Paper Bags(3) Branching and Looping Statements with Starburst Candies(4) General Class Structure with Bags, Boxes, and a Bin(5) Dr. Doolittle’s Vet Office: Learning Classes with Stuffed Animals(6) Arrays with Tissue Boxes, DVD Sets, Paper Plates, and other Household Goods(7) Basic Networking, Message Passing, and Security with
predecessor BroadReach, were developed at East CarolinaUniversity (ECU), by Mr. Lee Toderick, the co-author of this paper.BroadReach was created to provide automated, secure, remote connectivity between distributednodes (on or off campus) and central server resources located on campus. BroadReach Extended(BRE) was recently added to provide automatic assessment for locally created remote labexperiments to students. This section describes the functions of both.2.1 BroadReachRefer to Figure 1. The purpose of BroadReach is to use IPsec to create a secure connectionbetween two remote locations, regardless of the computer network a packet travels across8.Unlike some tunneling protocols such as SSH, IPSec passes all traffic through the virtual
paper thereby serves as an innovative way to expose technology students to this difficult topic and gives them a fresh taste of Python programming while having fun learning the Discrete and Fast Fourier Transforms. 1. Background Engineering departments are often confronted with the necessity to update laboratory exercises and equipment with the latest emerging technological trends within tight budget constraints. Another challenge faced by departments pertains to satisfying the Engineering Technology Accreditation Commission (ETAC) criteria for capstone senior project experience within the curriculum. In this paper we will explain how we attempted to solve these challenges by exposing students to new emerging
overallorganizational success.Introduction: Information Technology (IT) is a fast-growing field interrelating many disciplinesto fulfill business computing and transactional processing needs. Information technologyencompasses hardware, software, and network communications software and hardware toprovide high quality services and products. The advancement of network telecommunicationsand related technologies has served as a catalyst to many organizations to advance the way toconduct business. More businesses now utilize web-based computing and transactionalprocessing. Adopting a prescribed process model is a major factor in the ability to save time andmoney within an organization [1][21][23]. Organizations could implement ITIL partially orfully without
selection structures,modestly beneficial in assessments using repetition structures, and of no benefit in assessmentsusing just sequence. Despite the learning benefit, a majority of students and instructors wereresistant to using case-studies in this course and thought that reading stories does not belong in aproblem-solving/computer programming course. Therefore, novel approaches to engage studentsand instructors in interdisciplinary thinking and practice are necessary.1. Student Stories as Contexts for Problem-Solving and Computer Programming CoursesThe PS course is required for all Computer Systems first-year majors, but it is also taken bystudents with other majors. In the first part of the PS course, students learn basic proceduralprogramming
mention its impact as a source of information. This paper is organized as follows: Section II presents related work. The monitoring system is describedin Section III. The Usage Scenario is described in Section IV. Finally, the results, analyses, conclusions,and future work are presented in Sections V. II. RELATED WORK Projections indicate that by 2012, video use will constitute half the consumption of network resources allover the world, thus surpassing the P2P traffic, currently responsible for the greater part of network traffic.By the end of the decade, projections indicate that this percentage will fit about 90% of the networkbandwidth [1]. With this forecast it is extremely important to
also include socialactivities to show that college can be fun, too.The Computer and Information Technology department actively participates in these outreachprograms. A variety of activities designed by faculty, undergraduate, and graduate students havebeen used in these sessions over the past ten years. Some example sessions included the use ofthe following tools: 1. Web page development (static HTML to dynamic ASP.NET) 2. Social media tools through a Twitter-enabled game 3. Programming languages a. Alice b. Scratch c. Scratch 4 Arduino d. C# 4. Physical computing a. Arduino board b. Phoenix Contact Nanoline microcontrollerThe remainder of this paper will present the
in the city of Innopolis, Russia. The city was establishedin 2013 as a special zone with relaxed taxation for IT companies to foster the industry’s development.1 It wasplanned as a city with 100k+ population, which will be primarily represented by IT professionals. Innopolis University was established by major Russian IT companies to cover a shortage of IT engineers onthe Russian market. The university adheres to the Bologna process with broad adoption of best practices frompartner institutions (namely, Carnegie Mellon University). English is used as a primary teaching language. Asof 2015, tuition for all students is covered by grants awarded by founder companies. This grant system impliesa strict selection process, with only 2.5% of
our gamification platform,GamerCard, which was used for four semesters in an upper-level game design course at ourinstitution. We found that some gamification elements that are often thought to be motivatingfor participants had little to no effect on our course, while elements that specifically targetedmaking the student’s standing in the course more transparent were the most effective.1. IntroductionGamification is becoming an increasingly popular methodology for improving motivation andinterest in many domains [1]. Gamification involves the application of game mechanics to taskstypically considered to be void of fun. In the classroom, this often materializes as a set ofmechanics meant to motivate students to learn more effectively. For
detailed computations step by step and perform self-study. A test report system also helps the instructor verify the learning effectiveness. The FullMode is a full version of the SHA-512 cipher.SHAvisual was classroom tested in a Computer Security course. Major findings of this surveyinclude the following: (1) students indicated SHAvisual helped them understand SHA better; (2)both the Demo Mode and Practice Mode had positive impact on student learning; and (3) aMANOVA analysis suggested that the student reactions were generally independent of the timespent on using the software. Write-in comments also verified that SHAvisual did help studentslearn and the instructor teach the SHA algorithm effectively.1. IntroductionData security is vital to the
consumers and the cloud providers.1. BACKGROUNDIn a network security class, students learned the basics about how to provide confidentialityusing either symmetric key encryption or asymmetric key encryptions. They have also beentaught how to provide authenticity by applying techniques with Message Authentication Code(MAC). In this work, students were challenged to explore how the cryptography knowledge canbe applied in real world settings. Specifically, students were encouraged to first study securityconcerns in cloud computing. They were then been asked to discover how cryptography can beused to enhance security in cloud computing. In order to evaluate how practical the proposedapproach, they were instructed to establish a testing environment to
courses to be taken later by the students.In this section the objective is to observe technology preference of undergraduate and graduateSTEM majors’ when they are asked to draw the graph of functions. Questionnaire and interviewresponses of several participants will be displayed for clarity of the decisions made by theparticipants. Page 26.1614.4Q6) If you are required to draw the graph of a given function by using technology, what kind oftechnology would you use? Please either choose one of the following or write your own answerand explain why. 1. Calculator (If this is your choice please specify the kind of calculator you use) 2. Excel
project outcomesinto three different categories:1. Successful: Projects that are completed on-time and on-budget, with all features and functions as initially specified.2. Failed: Projects that are cancelled at some point during the development cycle.3. Challenged: Projects that are completed and operational but over-budget, over the time estimate, and/or offer fewer features and functions than originally specified.Analyses show high failure or challenged project rates with the root cause centered squarely onplanning, readiness, and assessment. Mandal and Pal clearly declare that their “research indicatesthat more than 50% of all Information Technology (IT) projects become runaways –overshooting their budgets and timetables while failing to
. Multiple regression analysis shows that a subset of conceptualassessments consisting of repetition, classes, assignment operations and Java syntax is sufficientto predict students’ ability to write viable programs (r2 = 0.78).In conclusion: 1) Adequate average performance in programming concepts is necessary but notsufficient for students to write viable computer programs; 2) Adequate performance in allindividual conceptual categories, and not just adequate average performance, is necessary to beable to write viable computer programs; 3) Given the correlations between performance indifferent conceptual categories, a subset of conceptual assessments consisting of repetition,classes, assignment operations and Java syntax is sufficient to predict
extremely abstract topic that requires deep conceptual knowledge.Devices used for parallel computing are often “black boxes” in which the only indication oftransmission is through limited external cues (i.e. flashing LED lights or the hum of the system).In the project discussed in this paper we postulated that if we can provide those who are new tothe idea of parallel computing a visual and embodied experience, they would find it easier tocomprehend the concept. To translate this idea into a designed object, a kinetic computingsculpture comprising of a functional cluster of Raspberry Pi computers (figure1.) has been builtby an interdisciplinary group of researchers.Figure 1. Kinetic sculpture (prototype version consisting 30 Raspberry pi computers
, access control, and secure protocols. c American Society for Engineering Education, 2016 Mobile Computing and Security Laboratory Development with Flip TeachingAbstract Android has reached over 1 million devices and occupies 85% of the market in 2014, according to a recent market report. Due to many advantages of the Android platform, such as open source, Google support, advanced software programmable framework in popular programming language Java, Android has been and will remain as the most popular mobile device operating system in market. Due to large popularity of user markets, research study of mobile computing is raising to a challenge level. In
corporations seeking to expand successfully. c American Society for Engineering Education, 2016 Architectural evaluation of Master Data Management (MDM): Literature Review Abstract: Architectural evaluation of MDM data models are influenced by technicalassessment, business requirements, and designers’ preferences. Therefore, selecting the rightmodel for an organization requires quantitative method with qualitative embedded design study.Greene [4] states that three purposes of quantitative study with embedded qualitative designinclude 1) triangulation, to guarantee or attain validation of data, or convergent validation; 2)complimentarily, to elucidate, clarify, or
software testing repository that provides educators and learners with online materials and socio-psychological supporting components. This project provides several learning and engagement strategies (LESs) such as gamification, collaborative learning,1 http://wrestt.cis.fiu.edu/social interaction and networking to improve students’ knowledge of software testing inprogramming courses ranging from CS1/CS2 to more advanced courses with aprogramming component. In this experimental study at Alabama A&M University(AAMU), through a two-year collaborative effort with Florida International University(FIU) [1], we present the data, results and analysis of using gamification in programmingrelated courses, as well as the way to improve
will be used to teach students to understand ethical issues andprofessional responsibility related to computer science and information systems. Moreover, theywill be discussed when teaching professional responsibility within technological, economic, andenvironmental points of view.INTRODUCTIONAs the amount of corporate and personal information continues to grow, and access to thatinformation by information technology (IT) professionals increases, ethics and value judgmentsby computer and information systems professionals becomes more important [4]. [1], definedthree factors which require further study of ethical behavior of IT professionals. These include agreater reliance on IT systems across business enterprises, increasing the future use of
phenomenon of leveragingsmartphone functionalities in a real-world organizational context are analyzed. As such, adescriptive linear-analytic interpretive case study research design was selected and employed[1]. The framework can also be applied to assessing the sharing of knowledge in a classroombetween students and professors using mobile computing devices such as smartphones. Thiscan be particularly helpful at engineering schools where classes are being turned “upside-down” with peer-led team learning workshops. This active-learning approach has led toincreased confidence, intellectual curiosity, and interest in teaching among students [2].Airlines that implement advanced mobile computing platforms such as smartphones areempowering their