Asee peer logo
Displaying all 25 results
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Stephen J. Zilora, Rochester Institute of Technology (CAST); Jim Leone
Tagged Divisions
Computing & Information Technology
Intergroup coordination Software product engineering Integrated software management Training program Organization process definition Organization process focus 2-Repeatable Software configuration management Software quality assurance Software subcontract management Software project tracking Software project planning Requirements management 1-Initial Figure 1 CMM Levels and KPAs For Software DevelopmentAll organizations are, by definition, at least at Level 1. At this level, software development isdone
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Cory Brozina, Virginia Tech; David B. Knight, Virginia Tech Department of Engineering Education
Tagged Divisions
Computing & Information Technology
potentially enhance learning processes across the world.University MOOC AdoptionWhile MOOCs have provided the educational arena with a lot of excitement and opportunity,higher education institutions are still undecided (55%) or have no plans (33%) for offering aMOOC6. Many institutions are waiting to see whether the movement is sustainable or becomesan educational fad. One of the biggest proponents of MOOCs and leaders in their developmenthas been Georgia Tech, which plans to offer a computer science master’s degree program on theUdacity platform beginning in January 2014. This program will greatly reduce the cost of thedegree program for students, and enrollment in the Udacity-based platform will be less than$7,0007. It remains to be seen how the
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Kansas State University; Eugene Y. Vasserman, Kansas State University; Eleanor C. Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
I think so / probably 7 Not sure 4 I don’t know enough to answer that question 1 Is cybersecurity research something that you would enjoy doing? Yes / sure 10 Probably 4 Do you see cybersecurity involved in your career after you graduate? Definitely / yes 11 Depends 3 Do you plan to seek out jobs
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Ge Jin, Purdue University Calumet (College of Technology); Gerald A. Dekker Jr., Purdue University Calumet; John Moreland, Purdue University Calumet; Barbara Jean Nicolai, Purdue University Calumet
Tagged Divisions
Computing & Information Technology
lack of planning andcoordination on both federal and state levels, the question arose as to the preparedness of localgovernment programs. Indiana Townships are part of state and local government systems which Page 24.749.2supply indigent populations with needed services. Research has shown that, at present, manysystems lack an emergency plan capable of meeting immediate needs such as basic shelter, food,clothing, and medical services for a large number of people in a short amount of time [2-6].Better information and decision support to the manager can provide more accurate focus andpriority to balance the emergency response. Geospatial
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona; Mohammad Rafiq Muqri, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
students integrate knowledge and skills learnt in the previous courses.In the first course (ECET-390, Product Development) students from Electronics and Computerprograms are asked to form teams, and then required to research, plan and develop a projectproposal. Then in the next three senior project courses (ECET-492, ECET-493 & ECET-494: 24Weeks) students implement the project plan by building and testing a prototype. A typical projectinvolves a solution to a software/hardware-based engineering problem. The process of developingand implementing a solution to the problem offers a unique learning opportunity for students togain new insights and competencies and their team-work, problem-solving and analytical thinkingskills.Senior projects, also
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Cho Sehyeong, Myong Ji University; Yeonseung Ryu, Myongji University; Sang-Kyun Kim, Myongji University
Tagged Divisions
Computing & Information Technology
editor/execution environmentThe ExperimentFirst, we conducted an experiment in order to see if there is any enhancement in learning withCFL. Instead of measuring a long-term effect (e.g., one semester), we decided to measure rathera short-term effect. The reason is that long-term effects are not only difficult to measure, but canalso be easily intervened by many unforeseen factors. Thus, in order to minimize such sideeffects, the study was planned as a very short-term and tightly-controlled experiment. We had two classes of the C programming course, one with 32 students and the other with33, all freshmen, CS majors. None of the students had taken programming courses before. Theywere taught by the same instructor on the same weekdays, but in
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Peter J. Knoke, University of Alaska, Fairbanks
Tagged Divisions
Computing & Information Technology
computer systems which, with suitable software might have to cope withsuch problems include humanoid robots (cf. Isaac Asimov and his Three Laws of Robotics2.The name “wicked problems” has appeared in recent years and generated considerableinterest. It was originally applied to the field of social planning, where it was defined by a10 point list3 That was later generalized to a 6 point list by Conklin as follows: 1) The problem is not understood until after the formulation of a solution. 2) Wicked problems have no stopping rule. 3) Solutions to wicked problems are not right or wrong. 4) Every wicked problem is essentially novel and unique. 5) Every solution to a wicked problem is a “one shot operation” 6) Wicked problems
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
MD B. Sarder, University of Southern Mississippi
Tagged Divisions
Computing & Information Technology
instruction [6].Design MethodologyOne of the most important elements of planning and managing online courses is that there are lotof tools and techniques available, but not all of these technologies are appropriate matches to thesubject taught and the teacher‘s pedagogical style and strategies. As such, it is very importantthat instructors ensure that pedagogical principles drive the use of technology rather than theother way around. Instructors must strive to achieve certain learning standards, regardless of themedium through which they are teaching [11]. Because of this, course planning should take placebefore instructors select the technology and course management system that will be used for thecourse.It is also important to note, that although
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Francis Giraldeau, Polytechnique Montreal; Michel R. Dagenais, Ecole Polytechnique de Montreal; Hanifa Boucheneb, École Polytechnique de Montréal
Tagged Divisions
Computing & Information Technology
exposing students to queueing theory in an intuitive manner.4 OutcomesThe above activities were used for teaching Operating Systems during the 2013 Fall semester.There were 58 students registered for the class.Comparing the proposed activities to other approaches would require multiple groups withdifferent material. However, it was not possible for logistic reasons. Instead, our goal is toverify that activities are well suited to the context at hand, to learn about related difficulties,and to document potential improvements. We invited students to participate in an onlinesurvey at mid-term and we conducted a focus group at the end of the semester. We plan toperform in the following semester a quantitative analysis on students grades to
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Scott A. Kuhl, Michigan Technological University; Robert Pastel, Michigan Technological University; Ryan George, Michigan Technological University; Chad M. Meyers, Michigan Technological University; Matthew L. Freitag, Michigan Technological University; Jacob M. Lund, Michigan Technological University; Michael Paul Stefaniak
Tagged Divisions
Computing & Information Technology
description of what is completed and what they plan to complete next; and (3) Whether the presentation was well-organized and easy to understand. After the general meeting, one student manager is responsible for averaging the grades, assigning Page 24.1165.7 the grades to the team-members in the gradebook, and giving the comments from the forms to the team leader. All members of a team typically receive the same grade. • 30% of the grade is based on documentation. Every student is expected to use a source code management system (SVN) and to use a issue tracking system (Redmine). Students are expected to create tickets in
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University (ENG); Charles Richard Cole, Southern Polytechnic State University; Christopher Welty, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
discovery. At each stage they are required to document decisionsand provide visualization to represent the formal and experiential qualities of their designs. Spa-tial relationships are typically shown through conventional orthographic projections of plan, sec-tion and elevation. For instance the student may develop a floor plan to articulate the circulationpatterns within the design while simultaneously illustrating the spatial layout of the programcomponents. The experience of the space may be represented through a series of perspectivedrawings. Architectural detailing and constructability of the tectonic details are required and de-veloped through drawings and models. The student must show the relationship of building skinor enclosure with
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manaz Rusi Taleyarkhan, Purdue University; Oluwatosin Alabi, Purdue University, West Lafayette; Alejandra J. Magana, Purdue University, West Lafayette; Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
used the last question to determine therelationship between user perceptions of nees.org and their frequency of use.How can nees.org users be characterized based on their intentions of use of NEES.orgcyberinfrastructure?As shown in Figure 1, the majority of users decided to use the NEEShub on the basis of intuition,and they believe the platform will be useful. A minority of users agreed that NEEShub willbecome popular and plan to adapt the tool as part of their practice should the Hub fully maturesto include standardized functionality and training. Page 24.162.4 Figure 1. Characterization of nees.org users based on their level of
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Tanya Stanko P.E., Innopolis University; Oksana Zhirosh, Unium
Tagged Divisions
Computing & Information Technology
6. Current world map of the respondents’ place of occupation by countryConclusions and plans for future researchIn this study we have demonstrated that the IT competencies chosen by InnopolisUniversity are highly valued by a large scope of stakeholders: from high-school pupils tosenior managers and government officials.Our current study is a unique research highlighting opinions of large groups ofstakeholders in Russia. We have observed that the opinion of Russian IT professionals isstatistically close to their EU and US colleagues with some minor discrepancies in howthey rate the importance of communication skills, innovation and teamwork.We have discovered that 2/3 of girls showing interest in IT profession do not pursuedegrees in IT
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Brian Joseph Lane
Tagged Divisions
Computing & Information Technology
with MacBook Pro, connecting with theAutonomous Terrain Sensing Vehicle, and controlling the vehicle from a remote location, theuser is given a fascinating experience by being able to change settings on the fly. The mainpoint is that every great iOS iPhone or Mac app starts with a brilliant idea. Translating the ideainto action requires planning. In the co-author’s own words, “Before you can write any code,you have to take the time to explore the possible techniques and technologies.”The core infrastructure of a Mac or an iOS app is built from objects in the UIKit or an AppKitframework. There are some resources that must be present in all Mac-based apps. Most appsinclude images, sounds, and other types of resources for presenting the app’s
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Vamshi Krishna Bolly, Purdue University; John Springer, Purdue University, West Lafayette, IN, USA; J. Eric Dietz, Purdue University
Tagged Divisions
Computing & Information Technology
Technology and a Director in Purdue’s Discovery Park, Dr. Dietz is responsible for the catalysis of the Purdue’s homeland security research, increasing the impact of Purdue research on society, and or- ganizing interdisciplinary projects within the university. Prior to his current responsibilities, Eric was on loan from Purdue to Governor Mitch Daniels to serve as the founding Executive Director for The Indi- ana Department of Homeland Security, a new state agency of over 300 people responsible for emergency planning, training, fire and building safety, and disaster response for 6.2 million Indiana residents. During this period, Eric led Indiana’s response to 7 Presidential Major Disasters and Emergency Declarations which
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Jimmy Faraon, National University
Tagged Divisions
Computing & Information Technology
flows. In thispaper we will discuss the transition to cloud computing approach considering strategicpreparation, planning and designing, implementation and migration and optimization.The strategic planning, evaluates security risk, focusing on protecting access andproviding on-demand security options within a service catalog for IT users. The planningand designing requires close coordination among the members of the IT team, advisers,and cloud vendors. Implementation and migration involves implementing the securitytechnology design, the security portal design, automated audit, and physical safety andsecurity designs. Proven methodologies, best practices, and deep understanding of thecore systems within the cloud environment can facilitate a
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Kien A. Hua, University of Central Florida; Gholam Ali Shaykhian, NASA; Robert J Beil, NASA Engineering and Safety Center; KUTALMIS AKPINAR, School of Electrical Engineering and Computer Science, University of Central Florida; Kyle A. Martin, University of Central Florida
Tagged Divisions
Computing & Information Technology
resources varying from iron-nickel to silicates and possibly subterranean water ice [1].Planning landing sites for future missions to the Moon and beyond will require balancing anumber of competing objectives, such as available water ice, proximity to interesting surfacefeatures, hazard to landing craft, rovers, habitats, etc. Image data mining of extraterrestrial datasets will help automate the discovery of geological formations important for missions to theMoon, Mars, and other planetary bodies. Page 24.1065.2Planets and other bodies in the solar system share a number of visual features that provideimportant information on their formation and
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Quan Do, New Mexico State University; Rajeev K. Agrawal, North Carolina A&T State University; Dhana Rao; Venkat N Gudivada, Marshall University
Tagged Divisions
Computing & Information Technology
. Page 24.221.9Our future research direction is multifold. First, we will implement the strategy design pattern sothat our system can work with databases which are managed by MySQL, Oracle, and MicrosoftSQL Server. The second one involves generating natural language description of an autogenerated SQL query using textual generation algorithms. Third, we plan to extend the approachto generate multiple choice questions. Fourth, we will measure the effect of the Web-basedsystem on student learning by having control and experimental groups.References [1] ABET, Inc. www.abet.org/index.aspx, August 2013. Last checked: 5 August 2013. [2] M. Al-Yahya. OntoQue: A question generation engine for educational assesment based on domain ontologies. In
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy
Tagged Divisions
Computing & Information Technology
-oriented society, some researchers 4,5,6, haveargued that the development of autonomous learners is fundamental. Coto describes autonomyas: … the ability to take charge of one’s own learning. It means to have the responsibility for setting learning goals; identifying and developing learning strategies; developing study plans; reflecting on learning; identifying and selecting relevant resources and support; and assessing one’s own progress7.In a research study conducted at the National University of Costa Rica with the goal ofproducing a curriculum shift from a teacher-centered approach toward a student-centeredapproach, it was concluded that this shift is not going to be an easy one. They pointed out theimportance of
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Afsaneh Minaie, Utah Valley University; Ruhul H. Kuddus, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai
Tagged Divisions
Computing & Information Technology
work atthe conference and get their registration fee waved. Sometimes, the students are willingto pay for a big part of the travel expenses because this trip becomes a vacation for themand also get a publication for their resume.In order to enrich the content of this data mining course, the plan is that two weeks ofteaching sequence mining to be added to the content of this course. This gives the studenta considerable experience with mining such a complex data type that has applications inalmost any field.ConclusionSequence data mining has multitude of potential applications in diverse disciplines, fromaviation safety to health care and from student management to consumer behaviormanagement. Careful observation and deductive reasoning may
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reneta Davina Lansiquot, New York City College of Technology; Ashwin Satyanarayana, New York City College of Technology; Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
an intention “to offer players a chance to immerse themselves in a fantasy RPG [role-playing video game] that has a compelling plot while experiencing the classical game-play system that has endeared itself to the hearts of thousands of gamers in their childhood.” The hardware items needed to properly run the proposed game, such as specific memory requirements, graphics, and sound cards, are also presented here. • Project Description: Narrative of project design, flowchart (CS1); review of relevant literature, pseudocode (CS0); concept map and storyboards (EG1). A step-by-step plan of how students plan to implement their game in Alice is the main component of this section. This includes
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
goal/plan analysis of buggy Pascal programs. In Soloway, E., & Spohrer, J. C. (Eds.), Studying the Novice Programmer (pp. 355–399). Hillsdale, NJ: Lawrence Erlbaum. doi:10.1207/s15327051hci0102_4[17] Soloway, E., and Spohrer, J. C. (Eds.). 1989. Studying the novice programmer. Hillsdale, NJ: Lawrence Erlbaum.[18] Winslow, L. E. 1996. Programming pedagogy–A psychological overview. SIGCSE Bulletin 28(3), 17–22. doi:10.1145/234867.234872 Page 24.1280.12
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Rob Elliott, Purdue University School of Engineering and Technology, Indiana University Purdue University at Indianapolis
Tagged Divisions
Computing & Information Technology
night due date for summative assessments. Anecdotally, two students reported that theThursday night deadline was difficult because of their work schedules. This was significant tothe author, as students tend to plan their schedules to free up weekends for homework. Becausethe schedule of the flipped classroom is so different from that of other courses, students mayhave a more difficult time scheduling a wider range of deadlines. Page 24.181.7 19% Fair Unfair
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Norman Pestaina, Florida International University; Tiana Solis, Florida International University; Peter J. Clarke, Florida International Univeristy
Tagged Divisions
Computing & Information Technology
Page 24.199.5assessment process itself. The SOs are one set of program markers. Precisely because of theholistic nature of a well-designed capstone, all SOs can reasonably be expected to be manifestedvia completion of a capstone project. This confluence accounts for the suitability of the capstoneor Senior Project course as a medium for assessment of the program.Our BS-CS program utilizes assessment of SOs in the Senior Project course as one component ofits assessment plan. Other components include course-embedded assessment via quizzes andapplication of specialized rubrics to course artifacts; in addition, indirect measures are obtainedby surveying students, instructors, alumni and employers. In the remainder of this section, thestructure of
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Osvaldo Mangual, Honeywell Aerospace; Marvi Teixeira, Polytechnic University of Puerto Rico; Reynaldo Lopez-Roig, Polytechnic University of Puerto Rico; Felix Javier Nevarez-Ayala, Polytechnic University of Puerto Rico
Tagged Divisions
Computing & Information Technology
providedsufficient amount of detail so it can be used as a point of departure for further research. It canalso be used as an educational resource in algorithm manipulation, and/or further codedevelopment, regarding the choice of mixed-mode (MPI-OpenMP) versus direct MPIimplementations. Future WorkAs a future work we plan to benchmark for memory efficiency, where the mixed-mode approachcould have an advantage, and to advance our code optimization efforts seeking an increasedperformance for both techniques. ConclusionsBy using MPI for distributing data to