Asee peer logo
Displaying all 17 results
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Krystal S Corbett, Cyber Innovation Center; Chuck Gardner, New Orleans Military and Maritime Academy; Anthony Joseph Taffaro Jr., New Orleans Military and Maritime Academy; Marvin Nelson, Benton High School
Tagged Divisions
Computing & Information Technology
the program into the schools through the Cyber Science class, studentswho could not attend the camp could receive the benefits of the Cyber Discovery content. Theteam expanded the camp curriculum to include more in depth coverage of concepts as well asadditional content. Cyber Science, like Cyber Discovery, uses a microcontroller to conveyconcepts and provide a level of engagement for the students while integrating the engineering,computer science, and liberal arts disciplines. The disciplines are completely interwoven. In agiven week, students will learn various cyber themed concepts6. For instance, students learnabout artificial intelligence by programming the microcontroller to read input from a sensor tonavigate a given route. Then they
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Munish Sharma, Northern Illinois University
Tagged Divisions
Computing & Information Technology
Sharma, Northern Illinois University Page 23.807.1 c American Society for Engineering Education, 2013 Internet Accessible Remote Experimentation with Integrated Learning Management System AbstractResearchers and academics are developing Internet accessible remote laboratories, but only afew of them are in use for course delivery. One of the main drawbacks of developed systems isthe lack of an efficient Learning Management System (LMS). Most of the available LMS aredesigned for lecture classes (online or hybrid) and are not
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
selected universities aroundthe world. Course offerings of sixty one universities were studied. From this study, it can beseen that universities are using six models to integrate computing intelligence concepts into their Page 23.316.5computer science and engineering curriculum: 1. Offering an undergraduate course on computational intelligence or one of its paradigms. 2. Offering a graduate course on computational intelligence. 3. Integrating computational intelligence paradigms into their traditional courses. 4. Offering a graduate degree on computational intelligence 5. Offering a minor in
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
physiological functions in a hospital setting. Sensors today are effective for single measurements, however, are not integrated into a “complete body area network”, where many sensors are working simultaneously on an individual patient. Mobility is desired, but in many cases sensors have not yet become wireless. This creates the need for the implementation of new biomedical personal wireless networks with a common architecture and the capacity to handle multiple sensors, monitoring different body signals, with different requirements. The type and number of sensors must be configured according to monitoring needs related to different diseases, treatment, and the patient treatment life cycle12. WMSNs systems have several advantages over traditional wired
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
students innew ways. For example, Guzdial proposed an introductory media-centric programming coursefor non-majors, in which students manipulated sound, images and other media [14]. Othershave argued for game-based projects, and some have integrated gaming throughout theircomputing curriculum [15, 16]. Alternatively, some educators have introduced hardware into theclassroom. For example, Mahmoud uses mobile devices extensively through many computingcourses, enabling students to work with their own, personal devices [17]. Others have attemptedusing robotics in their curriculum, but have experienced varying results in student success [18].Overall, it is apparent that many educators are concerned with the current state of computingeducation, and are
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Brian R. King, Bucknell University; Ashwin Satyanarayana, New York City College of Technology
Tagged Divisions
Computing & Information Technology
have multiple databases, from multiple sources, often with their own formats. Adata warehouse is a type of database that focuses on the aggregation and integration of data frommultiple sources, usually for analysis and reporting purposes.Many fields in Big Data focus on the extraction of information. For example, BusinessIntelligence (BI) systems focus on providing historical, current, and predictive views for thebusiness making use of it. Often, BI and related systems manage their data in the form of datacubes, which are multi-dimensional views of data managed and modeled in a way for rapid queryand analysis. Online analytical processing, or OLAP, is an important part of BI systems thatfocuses on creating views and queries from data cubes for
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Shaundra Bryant Daily, Clemson University; Juan E Gilbert, Clemson University; Wanda Eugene, University of North Carolina Charlotte; Christina Gardner-McCune, Clemson University; Kyla Alanna McMullen, Clemson University; Phillip Wendell Hall Jr, Clemson University ; Sekou L Remy, Division of Human Centered Computing - School of Computing, Clemson University; Damon Lamar Woodard, Clemson University; Tania Roy, Clemson University
Tagged Divisions
Computing & Information Technology
country. The Human-CenteredComputing (HCC) PhD program at Georgia Institute of Technology has a particular focuson human-computer interaction (HCI), learning sciences and technology (LST), cognitivescience, artificial intelligence (AI), robotics, software engineering and information security.Students must complete three core classes that include Introduction to Human CenteredComputing, Prototyping Interactive Systems, and Issues in Human Centered Computing. Theymust also take 9 credit hours in an area of HCC specialization, and 9 credit hours in a minor oftheir choosing outside of courses offered by the college. The curriculum was designed to providestudents with depth and breadth of knowledge in HCC areas. Similarly, in the HCC PhD degreeprogram
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Camilo Vieira, Eafit; Alejandra J. Magana, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
Paper ID #6378Colombian Elementary Students’ Performance and Perceptions of Comput-ing Learning Activities with ScratchMr. Camilo Vieira, Eafit Master of Engineering from Universidad Eafit. Doctoral student in Computer and Information Technology at Purdue University. Research interests include Computing Education, Computational Thinking and Educational Technologies.Dr. Alejandra J. Magana, Purdue University, West Lafayette is an Assistant Professor at the Department of Computer and Information Technology at Purdue Univer- sity West Lafayette. Magana’s research interests are centered on the integration of
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
James P Cohoon, University of Virginia; J. McGrath Cohoon, University of Virginia; Luther A Tychonievich, University of Virginia; Catherine E. Brawner, Research Triangle Educational Consultants
Tagged Divisions
Computing & Information Technology
participants, the content is intendedas a resource for teachers to use when talking with principals, parents, school boards, andcolleagues about why computer science should be offered in their school.After defining computing, its intellectual merit, and its wide ranging applications, the content ofthis session is primarily data showing the unmet need for computing professionals and how thatneed could be better met by drawing on women and minorities, populations that are severelyunderrepresented in computing. Bureau of Labor Statistics occupational projections arecontrasted with Integrated Postsecondary Education Data System15 reports on numbers ofstudents earning degrees in computing. The contrast shows an extreme shortfall. Further, mostother
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Francis N Mensah, College of Engineering and Technology, Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
to classical music.Prof. Richard G. Helps, Brigham Young University Richard Helps is an associate professor in the Information Technology Program at BYU. He has research interests in embedded systems, human-computer interaction and curriculum design. He is a member off ASEE, IEEE, IEEE-CS, ACM-SIGITE and an ABET PEV for Information Technology. Page 23.1057.1 c American Society for Engineering Education, 2013 Security Analysis of CPS: Understanding Current Concerns as a Foundation for Future
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Duke Mejia Bulanon, Northwest Nazarene University; Stephen A. Parke P.E., Northwest Nazarene University
Tagged Divisions
Computing & Information Technology
to study applications using unmanned aerial systems (UAS). The UASprimarily serves in military applications but recently has begun meeting civilian applications5, 6.These grants have provided great undergraduate research opportunities. A MVS will be used to Page 23.351.2develop the CMP. Mounting the CMP to the UAS could provide a powerful tool for farmers inthe future. This paper discusses the integration of this undergraduate research with teachingcontrol systems, specifically machine vision.2. Machine vision2.1 Generic machine vision modelMachine vision can be defined as a combination of an imaging sensor with image processing toprovide
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
john pickard, East Carolina University; Te-shun Chou, East Carolina University; Philip J Lunsford II P.E., East Carolina University; John Spence
Tagged Divisions
Computing & Information Technology
the European Commission found that IPv6training and studies at universities were not rigorous enough and were not providing studentswith the IPv6 knowledge or skills necessary to have any critical impact.8 As a result of thisfinding, the IPv6 Forum launched the IPv6 Education Certification Logo Program in 2010.11The IPv6 Forum encourages colleges and universities to play a key role as part of this program toaccelerate the adoption and integration of IPv6 in the Education Curriculum Worldwide.“We believe IPv6 Training will be quite necessary for the whole Internet industry and its users.There is huge demand in China, where IPv6 Internet is now considered as a national strategy”,states Liu Dong, Chair China IPv6 Council.11The Importance of
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University; Scott Pack
Tagged Divisions
Computing & Information Technology
Paper ID #7263Introducing Information Technology Students to Cyber-Physical Systems Us-ing a Lab ExperienceDr. Richard G. Helps, Brigham Young University Richard Helps is an associate professor in the Information Technology Program at BYU. He has research interests in embedded systems, human-computer interaction and curriculum design. He is a member off ASEE, IEEE, IEEE-CS, ACM-SIGITE and an ABET PEV for Information Technology.Mr. Scott Pack Page 23.818.1 c American Society for Engineering
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Lifang Shih, Excelsior College; Jane A LeClair, Excelsior College
Tagged Divisions
Computing & Information Technology
requirements.In addition to the Information Technology core requirements, students must complete a 3-credithour capstone course entitled, Integrated Technology Assessment (ITA), which involvesdevelopment and submission of E-portfolios. The Integrated Technology Assessment (ITA)process in Excelsior College’s BSIT Program provides students with an opportunity to create andmanage web-accessed electronic portfolios that document their knowledge, skills, andachievements from coursework, practical work experience, and other extracurricular activities.These portfolios support student reflection and provide a thoughtful accumulation of academicand non-academic work over a period of time.In order to continue to track the students’ progress after graduation
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
23.1244.11underneath the board.Figure 5: Overview of power monitoring system and the power monitoring web interface. This interfaceis available through a URL that can be accessed from any web-enabled device. Page 23.1244.12 Figure 6: Full circuit board for the no-contact power monitor. Sensing circuit is labeled in red.A number of approaches that are used by twenty five universities to integrate wireless sensornetworks concepts into their curriculum were studied and published before11. Some institutionare utilizing the model of integrating Wireless Sensor Networks concepts as modules into theirexisting courses, as seen by the Massachusetts Institute of
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Dhana Rao, Marshall University; Rajeev K Agrawal, North Carolina A&T University (Tech); Venkat N Gudivada, Marshall University
Tagged Divisions
Computing & Information Technology
experiences for undergraduates. SIGCSE Bull., 40(1):466–470, March 2008.[12] Dmitry Davidov, Roi Reichart, and Ari Rappoport. Superior and efficient fully unsupervised pattern-based concept acquisition using an unsupervised parser. In Proceedings of the Thirteenth Conference on Computational Natural Language Learning, CoNLL ’09, pages 48–56, Stroudsburg, PA, USA, 2009. Association for Computational Linguistics.[13] Mary DeVito, Christine Hofmeister, Michael Jochen, and N. Paul Schembari. Undergraduate research in computer forensics. In Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD ’11, pages 61–68, New York, NY, USA, 2011. ACM.[14] John W. Eaton. GNU Octave. http://www.gnu.org
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Simin Hall, Virginia Tech; Clifford A. Shaffer, Virginia Tech; Eric Fouh, Virginia Tech; Mai Hassan ElShehaly, Virginia Tech; Daniel Breakiron, Virginia Tech
Tagged Divisions
Computing & Information Technology
for future testing and further development ofOpenDSA.2. Tutorial ModulesTutorial modules tested in this study represent a tight integration of content, interactive exercis-es, and assessment. This presents an innovative way to improve the state of the art in AV andteaching of DSA, as no project previously has tried to integrate AVs with text and assessment tothis degree. A module roughly corresponds to a section (a couple of pages) in a traditional text-book. A typical semester course might include over 100 modules. The vision for the completedelectronic textbook is for modules and their prerequisite structure to define a directed graph thatmakes up a Knowledge Map. It will characterize a viable self-contained electronic textbook. In