Asee peer logo
Displaying all 19 results
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
’, ‘behavior’ and ‘function’ as wellas similarly named and closely related concepts (such as “form and function”) for describingaspects of design. I have chosen to use the terms Structure (S), Function (F) and Activity (A) anddefine them as follows.Designers apply functional intentions (F) to abstract structures of instruction architecture (S) byexecuting a variety of instructional design activities (A). These structures, functions andactivities are different abstract domains or layers of the design process; each domain capturessome aspect of design decisions. The usage of these terms will be illustrated by an example.Technical content changes rapidly and constantly but the professor has no control of that changeprocess and cannot make design
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Barbara E. Brazon, Penn State University; Mary Lynn Brannon, Pennsylvania State University, University Park
Tagged Divisions
Computing & Information Technology
abilities.”6 These objectives were achieved utilizing a variety of Page 22.1605.3active learning methods, including lecture, demonstration, problem solving, collaborative work,formal team work, and peer learning. The assessment was done as formative assessment via oraland written reports and tests; and summative assessment with the completion of theimplementation of the website for the final grade. Interviews were conducted to acquire feedbackfrom the students on their perception of the learning experience using the Lesson‟s Learnedapproach.Course DescriptionIT Project Management was designed with two pedagogical approaches to learning
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Maurice F. Aburdene, Bucknell University; Kundan Nepal, Bucknell University
Tagged Divisions
Computing & Information Technology
: Data Rate = Bandwidth*log2(1+ S/N) where S/N is the ratio of the signal power to the noise power in decibels(dB).Now, students were asked to find the ASCII code for the initials of their names and showtheir understanding of the bit rate and bandwidth of the communication channel by repeatingthe Fourier analysis on those letters. To generate the ASCII waveform, students programmedthe Agilent 33120A Function Generator. Next, they designed a first-order RC low-pass filterwith a 3 kHz bandwidth and observed and captured the output response of the filter to theASCII waveform. 1. Obtain the binary 7-bit ASCII code for the first letter of your first name and last name. a. What is the 8-bit code using odd parity? Where did you put
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Edward F. Gehringer, North Carolina State University
Tagged Divisions
Computing & Information Technology
chapter, Expertiza automatically calculates due dates for later chapters based on a rule—that each due date for each chapter is say, two weeks, later than the corresponding due date for the latest prerequisite chapter. Thus, if Chapter 1’s resubmission deadline is, say, on Sept. 3, and Chapter 1 is a prerequisite for Chapter 2, then Chapter 2’s resubmission deadline will be on Sept. 17. The system sends an e-mail reminder to each student a day or two before the deadline for submitting or reviewing (the instructor determines how far in advance the e-mail is sent). 4. Dashboard for monitoring wiki textbook construction. The instructor needs to be able to keep close tabs on the
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University
Tagged Divisions
Computing & Information Technology
. L., Neff. G. P., Stratton, M. J., and Summers, D. C. S. (2002). Future directions for mechanical manufacturing, and industrial engineering technology programs, Journal of Engineering Technology, 19(1), pp.8-15.[5] Scott, J. (2003). A vision for online kindergarten learning community, Technological Horizons in Education, 30(7), pp.40-43.[6] Boyle, A. P., Bryon, D. N., and Paul, C. R. C. (1997). Computer-based learning and assessment: A palaeontological case study with outcomes and implications, Computers and Geosciences, 23(5), pp.573- 580.[7] Grose, T. K. (2003). Can distance education be unlocked, PRISM, April, pp.19-23.[8] Palais, J. and Javurek, C. G. (1996). The Arizona State University electrical engineering
Conference Session
Information Systems and Computing Potpourri
Collection
2011 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
. J. R. Armstrong and F. G. Gray, "Fault Diagnosis in a Boolean n Cube Array of Microprocessors," IEEE Trans.on Comput., vol. C-30, pp. 587-590, Aug. 1981.2. P. Banerjee et al., "An Evaluation of System-Level Fault Tolerance on the Intel Hypercube Multiprocessor,"Proc. 18th Int'l Symp. on Fault-Tolerant Computing, pp. 362-367, 1988.3. K. Y. Chwa and S. L. Hakimi, "On Fault Identification in Diagnosable Systems," IEEE Trans. Comput., vol. C-30, pp. 414-422, June 19814. A. T. Dahbura and G. M. Masson, "An O(n2.5) Fault Identification Algorithm for Diagnosable Systems," IEEETrans. Comput., vol C-33, pp. 486-492, June l984.5. A. T. Dahbura, "System-Level Diagnosis: A Perspective for the Third Decade" Tech. Rept. AT&T Bell Labs.,1987.6. E
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Peng Li, East Carolina University; John M. Jones, East Carolina University; Kris Kareem Augustus, East Carolina University
Tagged Divisions
Computing & Information Technology
PC to teach computer networking and operating systems”, Proceedings of the 4th Conference on Information Technology Curriculum, Lafayette, Indiana, USA, 2003.2. A. Gaspar, S. Langevin, W. Armitage, R. Sekar, and T. Daniels, “The role of virtualization in computing education”, Proceedings of the 39th ACM SIGCSE Technical Symposium on Computer Science Education Portland, Oregon, USA, 2008.3. J. Ekstrom, M. Bailey, “Teaching Web Deployment with OS-virtualization”, Proceedings of 2009 ASEE Annual Conference and Exposition, Austin, Texas, USA, 2009.4. P. Li, “Integrating Virtualization Technology into Remote Lab: A Three- Year Experience”, Proceedings of 2009 ASEE Annual Conference and Exposition, Austin, Texas, USA
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Paymon Sanati-Mehrizy, University of Pennsylvania; Ali Sanati-Mehrizy, Pennsylvania State University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
intends on attending Medical School.Ali Sanati-Mehrizy, Pennsylvania State University Ali Sanati-Mehrizy is a medical student at the Milton S. Hershey Medical Center at Pennsylvania State University. His research interests include the application of mobile computing in the sciences. Upon completion of medical school, he hopes to pursue a career in Internal Medicine/Pediatrics with a further specialization in Hematology-Oncology.Dr. Reza Sanati-Mehrizy, Utah Valley University Page 22.926.1 c American Society for Engineering Education, 2011 Integration of Mobile Computing into
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Alejandra J. Magana, Purdue University, West Lafayette; Aidsa I. Santiago-Román, University of Puerto Rico, Mayaguez; Nayda G. Santiago, University of Puerto Rico, Mayaguez; Cesar A Aceros; Brandeis H Marshall, Purdue University; Eric T. Matson, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
problemsolving task, we explored how technology and engineering students approach solvingcomputational problems. This study is guided under the premise that people’s ways ofexperiencing phenomena result from the unique interaction of their understanding of thephenomena and the situation in which they must apply that understanding 6 . Our ultimate goal isthat by identifying, comparing, and contrasting students’ understandings and strategies toapproach problems, more effective instructional approaches will be identified.Theoretical FrameworksProblem-based learning and Computational thinking theoretical frameworks are merged in thedesign and analysis of this study. Problem-Based learning is a student-centered instructionalstrategy to guide the learner(s
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Tao Xing, Tuskegee University; Legand L. Burge Jr., Tuskegee University; Heshmat A. Aglan, Tuskegee University
Tagged Divisions
Computing & Information Technology
). Page 22.927.87 Nakajima, K. & Hori, M. in 2009 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2009, August 8, 2009 - August 11, 2009. 319-322 (IEEE Computer Society).8 Huang, Y.-M., Kuo, Y.-H., Lin, Y.-T. & Cheng, S.-C. Toward interactive mobile synchronous learning environment with context-awareness service. Computers and Education 51, 1205-1226 (2008).9 Dagon, D., Martin, T. & Starner, T. Mobile phones as computing devices: The viruses are coming! IEEE Pervasive Computing 3, 11-15 (2004).10 Maniar, N., Bennett, E., Hand, S. & Allan, G. The effect of mobile phone screen size on video based learning. Journal of Software 3, 51-61 (2008
Conference Session
Information Systems and Computing Potpourri
Collection
2011 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
+100 Equal test; PC relative branch Branch on bne $1,$2,100 if ($1!= $2) go to PC+4+100 Not equal test; PC relative sss ssss set on less than slt $1,$2,$3 if ($2 < $3) $1=1; else $1=0 Compare less than; 2’s comp. set < imm. slti $1,$2,100 if ($2 < 100) $1=1; else $1=0 Compare < constant; 2’s comp. set < uns. sltu $1,$2,$3 if ($2 < $3) $1=1; else $1=0 Compare less than; natural numbers set < imm. uns. sltiu $1,$2,100 if ($2 < 100) $1=1; else $1=0 Compare < constant
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
AC 2011-1231: EXPLORING THE USE OF VIRTUAL MACHINES ANDVIRTUAL CLUSTERS FOR HIGH PERFORMANCE COMPUTING EDU-CATION.Thomas J. Hacker, Purdue University, West Lafayette Page 22.690.1 c American Society for Engineering Education, 2011 Exploring the Use of Virtual Machines and Virtual Clusters for High Performance Computing Education.AbstractHigh performance computing systems have been based on commodity computing hardware sincethe introduction of Beowulf systems in the mid-1990’s. The emergence of virtualization andcloud computing technologies now make it possible to build high performance computing
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Evan Jackson; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing & Information Technology
AC 2011-2280: MOUNT TIMPANOGOS COMMUNITY SPECIES DATABASEDr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science at Utah Valley University. His research interests include Data Structures, Databases, and Data Mining.Mr. Evan JacksonAli Sanati-Mehrizy, Pennsylvania State University Ali Sanati-Mehrizy is a medical student at the Milton S. Hershey Medical Center at Pennsylvania State University. His research interests include the application of mobile computing in the sciences. Upon completion of medical school, he hopes to pursue a career in Internal Medicine/Pediatrics with a further specialization in Hematology-Oncology.Paymon Sanati-Mehrizy, University of Pennsylvania
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Don Chen, University of North Carolina, Charlotte; Bruce Gehrig, University of North Carolina, Charlotte
Tagged Divisions
Computing & Information Technology
package(s) to fulfill specific body of knowledge (BOK) for the ConE education?METHODOLOGYIn this research study, two widely used BIM software packages, namely Autodesk Revit family2010 and Vico Virtual Construction Suite 2008, were selected and their capacities andlimitations were examined by the authors. As a case study, these two packages were used to Page 22.818.4model a two-story academic building. Finally, conclusions and recommendations are provided.BIM SolutionsAs BIM technology continues to evolve, software vendors have been developing solutions to fillthe BIM matrix. A brief introduction of the most developed BIM solutions
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Jeongkyu Lee, University of Bridgeport; Omar Abuzaghleh, University of Bridgeport
Tagged Divisions
Computing & Information Technology
) Page 22.816.5 64-bit PowerPC 32 KB Instr/Data L1 Cache, 512 KB L2 Cache SMP (2 threads) 3.2 GHz (SP: 25.6 GFlops DP: 6.4 GFlops) o 8 SPEs (Synergistic Processing Element) 256 KB Local Store 3.2 GHz (SP: 25.6 GFlops DP: 1.83 GFlops ) 128-bit Vector Registers o EIB (Element Interconnect Bus) Interconnects PPE, SPEs, Memory, I/O Simultaneous Read/Write o MIC (Memory Interface Controller) Interfaces to XDR Memory Theoretical B/W of 25.6 GB/s o 218 GFLOPS of total floating point performance
Conference Session
Information Systems and Computing Potpourri
Collection
2011 ASEE Annual Conference & Exposition
Authors
Guy Johnson, Rochester Institute of Technology
Tagged Divisions
Computing & Information Technology
, 2000, ISBN-10:1-879102- 81-1.6 MacEachren, Alan M., How Maps Work, The Guilford Press, New York, New York, Paperback Edition, 2004. http://www.guilford.com7 DNR Garmin Application, University of Minnesota, http://www.dnr.state.mn.us/mis/gis/tools/arcview/extensions/DNRGarmin/DNRGarmin.html (last accessed January 12, 2011)8 Goodchild, Michael F., Looking Forward: Five Thoughts on the Future of GIS, Esri ArcWatch e-magazine, February 2011. Page 22.1068.89 Matthew, J., Sarker, S. and Varshney, U.. M-Commerce Services: Promises and Challenges. Promises and Challenges. Communications of AIS 2004, 1-11.
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Iem Heng, New York City College of Technology; Farrukh Zia, New York City College of Technology, CUNY; Andy Zhang, New York City College of Technology
Tagged Divisions
Computing & Information Technology
, NY). He worked as a researcher for NASA Langley Base in Hampton, VA, for 2 years. His research activities include embedded systems, software development for embed- ded systems with real time simulation, real time gamming simulation programming, and web application programming.Farrukh Zia, NYC College of Technology / CUNYDr. Andy Zhang, New York City College of Technology Professor Andy S. Zhang earned his master’s in mechanical engineering from the City College of New York in 1987 and his Ph.D. in mechanical engineering from the Graduate Center of the City University of New York in 1995. Prior joining the Mechanical Engineering Technology department at City Tech in 2000, he served as an engineering instructor for
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Song Xing, California State University, Los Angeles
Tagged Divisions
Computing & Information Technology
success, teaching students the basics of technology and having a deeper understanding ofthe social impact brought on by the latest technologies. Students also practiced their writing andpresentation skills in these two courses.References [1] Brin, S. & Page, L. (1998). The Anatomy of a Large-Scale Hypertextual Web Search Engine. In Proceedings of the 7th IWWW Conference, Brisbane, Australia, 14-18 April 1998. [2] Bucknell University. (2010). Foundation Seminar. Accessed December 20, 2010 from http://www.eg.bucknell.edu/~found-cs/2009-fall/index.html [3] Bush, V. (July 1945). As We May Think. The Atlantic Monthly. July 1945. [4] Halavais, A. (2009). Search Engine Society Malden, MA: Polity Press. [5] Jansen, B.J. &
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Joseph Idziorek, Iowa State University; Mark F. Tannian, Iowa State University; Douglas W. Jacobson, Iowa State University
Tagged Divisions
Computing & Information Technology
23, 2011].11. S. Gustin, “Gawker Media Websites Hacked, Staff and User Passwords Leaked,” Wired. Dec. 2010. [Online]Available: http://www.wired.com/threatlevel/2010/12/gawker-hacked/. [Accessed: Feb 23, 2011].12. M. Wilson, K. Stine, and P. Bowen, “Information Security Training Requirements: A Role- and Performance-Based Model (Draft).” NIST Special Publication 800-16 Revision 1 (Draft). 2009.13. D. Jacobson. “Teaching Information Warfare with Lab Experimentations via the Internet.” In Frontiers inEducation, 2004. T3C/7-T3C12 Vol. 11 (2004).14. J.A. Whittaker and R. Ford, "How to think about security," IEEE Security & Privacy, vol.4, no.2, pp.68-71,March-April 2006.15. J. Viega, The Myths of Security, O’Reilly Media, Inc. Sebastopol, CA