Asee peer logo
Displaying all 10 results
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Don Chen, University of North Carolina, Charlotte; Bruce Gehrig, University of North Carolina, Charlotte
Tagged Divisions
Computing & Information Technology
, perform clash detection, and generate photorealisticvisualization. Same as Revit family, Navisworks is available free of charge for faculty andstudents to use for 14 months.Bentley System16 comprises a family of application modules that include Bentley Architecture,Structural Modeler, Bentley Building Mechanical Systems, and Bentley Building ElectricalSystems, Bentley Facilities, Bentley PowerCivil (for site planning), and Bentley GenerativeComponents. Its common interfaces include: DWG, DXF, and IFC. The major drawback of theBentley System is that is it hard to learn and navigate.Graphisoft’s ArchiCAD17 is the oldest BIM design tool available today. It is the only BIMsystem that can be used on the Apple Macintosh. Graphisoft has developed a
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Barbara E. Brazon, Penn State University; Mary Lynn Brannon, Pennsylvania State University, University Park
Tagged Divisions
Computing & Information Technology
clients provided thebases for the case studies, but the students did not have interaction with the clients. Then in thefall of 2007 the added constraint of working directly with a real world client was integrated intothe student projects. The focus of the course was giving students experience in managing aproject in a team environment. The innovation of adding a strong and primary emphasis onformal communication with the client and the team makes this management project exemplary asa teaching innovation.The students worked in teams of five, with each team member assigned a the task to completeone of the phases of the management process, e.g., initiating (systems analysis), planning, designand development, testing and closing phases. These groups
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Iem Heng, New York City College of Technology; Farrukh Zia, New York City College of Technology, CUNY; Andy Zhang, New York City College of Technology
Tagged Divisions
Computing & Information Technology
sufficient and no information equipments, schematic diagrams of information on information on on schematic etc.) to build the the systems to be schematic diagrams of schematic diagrams of the systems constructed the systems diagrams of the systems systems Develop a Well-organized and Adequate planned Less planned Lack of planned procedure for planned stages of stages of operation but stages of stages of operation constructing the operation and the less sequence of tests
Conference Session
Information Systems and Computing Potpourri
Collection
2011 ASEE Annual Conference & Exposition
Authors
Guy Johnson, Rochester Institute of Technology
Tagged Divisions
Computing & Information Technology
Mobile GIS and GPS software. Additionally, thiscourse provides students with the opportunity to plan and implement field surveys in a teamenvironment, as well as perform laboratory-based geospatial data analysis on informationcollected in the field. The course emphasizes the integration of geospatial technologies for fieldsurveys. Topics include: • Principles of Global Positioning Systems (40%) • Data accuracy requirements (10%) • Mobile GIS software (10%) • Field mapping planning and implementation (20%) • Location-based services and asset tracking (20%)Educational and career outcomes • Students will be able to describe the principles of Global Positioning Systems (GPS) location measurement • Students will be
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
, then we convert it to a tree, and then you could dump the tree right out of Oracle for your SQL – there it is! And then they had all the little notations on the performance on the tree and you could look at that. And then in Ten [Ed: version 10] they dropped that, and it was like so, Grrr! And they went to a text, and then you had to learn to read the text and the indentation and which ones were not indented, and to see what's Page 22.874.6 happening. So now what we have to do is pull out the plan as text and write the tree from the plan, so, Um! you know...Geoffrey also talked about this phenomenon. He
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Evan Jackson; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing & Information Technology
. Page 22.1083.2Project ImplementationDuring the Spring semester in 2009 at Utah Valley University, our Advanced Database Topicsclass was approached by our instructor with a plan for a possible database project. He asked usif we would be interested in designing a database to organize Geo located specimen photographysamples for a local volunteer biology project on Mount Timpanogos - a project that originatedby a biology instructor at the same university. As a class, a few of us were already interested ingathering and organizing data from a biological point of view, and this was a great opportunity toaccomplish what we wanted as well as to create a database as an extra-curricular class project.We chose to implement this application and provide
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Joseph Idziorek, Iowa State University; Mark F. Tannian, Iowa State University; Douglas W. Jacobson, Iowa State University
Tagged Divisions
Computing & Information Technology
real application of knowledge occurs. Initial assessment ofapplication has only been done informally by way of students voluntarily sharing anecdotal Page 22.1379.12accounts. As the course matures, we plan to provide more thorough and valid assessment of thisparticular course objective.          7. Future Work and ConclusionComputer security education is key to combating the risks and vulnerabilities intrinsic to theInformation Age. Each day, students are inundated with alerts and pop-ups informing themabout patch updates, antivirus signatures, firewalls
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
images, OpenVZcan deploy several virtual machine containers within each VM images that shares a kernel withthe KVM VM image. For the parallel data systems class in which students design, build, and testa parallel file system, we are planning to have students build parallel file systems within OpenVZcontainers. The major constraint in this approach is the I/O performance bottleneck for the I/Oserver components of parallel file systems running in virtual machines that must share physicaldisks on the services on which they operate. The approach we are considering to overcome thisconstraint is to schedule final performance runs for students running on physical servers. Basedon our assessment of the cloud computing and virtualization technologies, we
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Jeongkyu Lee, University of Bridgeport; Omar Abuzaghleh, University of Bridgeport
Tagged Divisions
Computing & Information Technology
Table/Index No Application Cluster Everything management Partitioning MySQL Cluster7 Shared Nothing Parallel plan User defined Yes partitioningAs shown in Table 2, MySQL cluster is the only Parallel and Distributed DBMS that supportFedora Core Operating System. Therefore, we installed MySQL cluster 7.0.13 on Fedora Core 12Linux. In addition, since MySQL Cluster employs shared nothing architecture, each node owns itsmemory and storage area for the instance. MySQL cluster has three different nodes: (1)management nodes: manage the entire distributed database in the cluster, (2) SQL nodes:coordinate SQL query requests, and (3
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Tao Xing, Tuskegee University; Legand L. Burge Jr., Tuskegee University; Heshmat A. Aglan, Tuskegee University
Tagged Divisions
Computing & Information Technology
Blackboard Inc. helped the instructor to set upusernames and passwords for all students and resolved some technical problems on downloadingand running BML on different platforms since students’ personal mobile devices differsignificantly from each other. Before the instructor gave each lecture, he informed students onany updates on the BML and help students to resolve any problems they may have. Studentswent through the BML materials with the instructor together in class briefly. Students can accessthe electronic lecture notes, announcements, syllabus, and assignments with due dates. Due tothe difficulties of setting up the mobile technology environment, other functions in the BMLwere not used but planned for the Spring semester of 2011.Evaluation