Asee peer logo
Displaying results 31 - 60 of 92 in total
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Michael Porter, Alabama A&M University; Ralph (Phil) Bording, Alabama A&M University; Yujian Fu P.E., Alabama A&M University
Tagged Divisions
Computing and Information Technology
software applications. MSTest is an open-source testframework with the Visual Studio IDE. MSTest provides a set of commands with a lot of optionsto customize the tests running at various NET applications. © American Society for Engineering Education, 2021 2021 ASEE Annual ConferenceIn order to reach the previously-stated design goal, several critical properties of the system aredefined below, e.g., reliability & robustness, authentication, correctness, and identity.Reliability and Robustness: Using UML and object-oriented concepts to plan and design theemployee and vendor management system resulted in a more reliable and robust system.Authentication: A very naïve and basic form of
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, Florida Institute of Technology; Khalil A. Said, Davenport University; Ghaythah Abdullah Alqarna
Tagged Divisions
Computing and Information Technology
as astrategic partner, and executives’ IT knowledge as crucial to accept management change andalign business with IT. Research suggested 60% or more of chief executives in Great Britainbelieved their company’s information technology did not typically help to achieve their businessgoals and objectives, compared with 39% for IT directors [16]. Meanwhile, IT managerscriticized the executive members who did not understand technology for failing to support ITinvestments and projects [16].In a competitive environment, a new role for the CIO required him/her “to establish, implement,and communicate the strategic IT vision and plan, wedded to the overall business strategy, andensure that IT is used effectively to achieve overall business goals
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Arshia Khan, University of Minnesota, Duluth
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
members in this work that was attached to a grade.discussion had different solutions. 2.4 Recommendations for future study Bearing in mind the observations and shortcomings of the interventions we plan to augment our interventions by ensuring the drawbacks observed were addressed. One recommendation is to have icebreaking games at the beginning to make the group
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Janis P. Raje
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
nearly quadrupled from its fall 1993 enrollment of 10,500. UVU isnow the largest bachelor-degree granting institution in the state. While this institutional transitionhas been the result of much strategic planning, it has strained state and community resources andcontinues to create a number of challenges, particularly in the availability of scholarship funds.UVU has a dual mission – that of a comprehensive university offering bachelor’s degrees and afew master’s degrees, and that of a community college offering associate degrees andcertificates. As part of its community college mission, the institution maintains an open-enrollment policy. Student demographics are similar to those of a community college, withmany students seeking a “second
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mehmet Ergezer, Wentworth Institute of Technology; Bryon Kucharski, Wentworth Institute of Technology; Aaron Carpenter, Wentworth Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
fromlinear algebra alongside Python and Numpy.Many undergraduate programs include artificial intelligence (AI) or embedded systems in theirCS curricula [9, 10, 11, 12]. However, the authors could not find a course that would combineboth topics. As the AI algorithms make their way into wearables, smart phones and Internet ofThings (IoT) devices, having experience in real-time AI algorithms will benefit students in theirprofessional careers.The course is still under preparation and is planned to be offered in the summer of 2018. We aresharing our work-in-progress that illustrates the development of the labs for EAI. Two differentforms of learning were taken into consideration: “top down” approach, where the student beginswith a fully functional model
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Cheryl Lynn Resch, University of Florida; Christina Gardner McCune, University of Florida ; Amanpreet Kapoor, University of Florida
Tagged Divisions
Computing and Information Technology
meetsoftware engineering requirements. Rogers suggested several frameworks for guiding learnersthrough reflection. One of these frameworks uses a set of structured questions about a particularexperience, and is the one we use in our study. The work of Schon, Dewey, Moon, and Rogersform our theoretical foundation and we used their ideas as a lens to interpret student reflections.Prior WorkVandegrift et. al. [11] describe an instrument used with an introductory Computer Science coursewith five programming assignments. After the second and third programming assignments theyprompt students to “Write down at least one SPECIFIC plan that you can implement to improveyour software development process”. They found that a majority of students could recognize
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
used in the course are discussed. Finally, plans forfuture offerings of this course are reviewed.1. IntroductionThis paper presents the efforts undertaken to develop and the implementation of a flexiblelearning defensive security course. The course covers the CompTIA Security+ requirements andis based on the HyFlex delivery model which was originally developed at San Francisco StateUniversity.This paper discusses how a limited-flexibility model was transformed due to the COVID-19pandemic into a highly flexible delivery model. Specifically, the course went beyond simplyhaving lecture and laboratory components to offering a HyFlex Options Menu where studentsselect between several options for each area of the class. Students were offered the
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Tamer Omar, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona; Kristina Rigden, California State Polytechnic University, Pomona; Thomas Ketseoglou, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
threats and defend against attacks without assemblingteams and qualified team members with skills in all the aforementioned disciplines. This paperaims at presenting the plan and procedures required for creating an project based interdisciplinarycourse at cybersecurity of frontier technologies between the College of Engineering, College ofScience, and College of Business Administration. The course objective is to bring students fromthe three disciplines into a multidisciplinary experience that aids students at replicating real lifeprojects. Instructors from all three disciplines guide the students during the course work andsupervise the project activities. The fifteen-week course can adopt different types of cybersecuritysystems and provide a
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Zhengze Lyu, Zhejiang University; Wei Zhang, Zhejiang University; Yixue Zhuang, Zhejiang University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
development background of computing education in China to form a morecomprehensive and clear understanding of it, and refine the path of the realization ofcomputing education through the structured case study.2 The development of computing education in ChinaThe training for computer science and technology professionals started in the United Statessince the 1950s. Later the training programs adopted by other countries including China, allreferred to the US system.In 1995, on the basis of extensive research, the Ministry of Education approved the plan forthe reform of educational contents and curriculum for computer science and technology. Theproject is undertaken by a team of teachers from 9 universities including Fudan University,Shanghai Jiaotong
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Simeon Ntafos, University of Texas at Dallas
Tagged Divisions
Computing and Information Technology
to meetwith an academic advisor to prepare a degree plan for the new major.Around 2014, multiple schools including the School of Engineering and Computer Science andthe School of Management enforced the 2.0 GPA threshold more and more strictly. By 2016,approvals for change of majors to these Schools for students that did not meet the thresholdwere very rare. This extended to change of major requests from one major to another withinthe School of Engineering and Computer Science as well. In the 2017 catalog multiple Schoolssought more control over the process for a variety of reasons, mostly over concerns about theability of the School to accommodate demand for its majors and allocation of resources tomatch growth. The 2017 academic catalog
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University
Tagged Divisions
Computing and Information Technology
products.The widespread adoption of LDAP is due to its flexibility, scalability, and compatibility. A computer network related program named Computer Network & System Administration (CNSA) was introduced at MichiganTechnological University in 2003 [3]. The purpose of this program was to serve the needs of industry by educating and training studentsto succeed in the field areas of systems administration and network engineering, with an emphasis on network security. An integral partof the CNSA curriculum is a three credit hour course on Directory Services (DS). In the DS course, students are exposed to topics like planning, designing, implementing and troubleshooting various directory serviceproducts, including Microsoft Windows Active Directory
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jingshan Wu, Zhejiang University; Yujie Wang, Zhejiang University; Hanbing Kong, Zhejiang University; Ling Zhu, Zhejiang University
Tagged Divisions
Computing and Information Technology
educationalparadigm for engineering can no longer be adapt for the emergence of complexsystems and grand challenges. As a response, School of Engineering launched a newLong Range Plan “Engineering with a Big E: Integrated Engineering Education”(Moses, J., 1994), which is essentially the integration of engineering technologies andengineering science at first and the integration of STEM and non-STEM elements aswell (Kong H.B, 2011).The “Big E” strategy led to CDIO (Conceive, Design, Implement, Operate) approachin the Department of Aerospace Engineering (Crawley, 2001) and had a profoundinfluence on engineering education: Olin College of Engineering came up with“Engineering2.0” demanding new qualities for the next generation of problem solvers(Miller R.K., 2017
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
biomasspower 5. A bachelor's degree with a specialization in renewable energy offers focusedengineering technology coursework, preparing students with technology skills that can put towork future in green technologies across three areas: Engineering Technology, InformationTechnology, and Software and Information Systems.As student pursue a bachelor’s degree with a specialization in renewable energy, will learn aboutalternative energy generation and the complex factors behind green technology. This includeshow economics, sociology and environmental science are connected, and the design processesused in today’s leading renewable energy initiatives. From planning and project management toenergy production and storage.In the following, courses for this
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Zhijiang Dong, Middle Tennessee State University; Joshua Lee Phillips, Middle Tennessee State University; Eric Oslund, Middle Tennessee State University; Chrisila Pettey, Middle Tennessee State University; Catherine E. Brawner, Research Triangle Educational Consultants
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
mentors are now required to create a SMART (Specific, Measurable,Achievable, Relevant, Time-bound) goal [15] for each mentee and develop a plan to implementthat goal in the academic year. The SMART goal and plan should be completed by the end ofOctober. Project PIs now meet with mentors to discuss the goals for their mentees to make sure itis reasonable. In addition, we survey mentors monthly to document their activities and meet withmentors once a month to gather feedback, identify potential problems, and share successfulstories or tips. Based on the monthly report from peer mentors during the 2020-2021 academicyear, we have observed positive changes between mentors and mentees.4.2 Research ExperienceUndergraduate research is one of the thirteen
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Peter J. Clarke, Florida International University; Debra Lee Davis, Florida International University; Ingrid A. Buckley, Florida Gulf Coast University; Geoff Potvin, Florida International University; Mandayam Thirunarayanan, Florida International University; Edward L. Jones, Florida A&M University/Florida State University
Tagged Divisions
Computing and Information Technology
the courses includes: test plan creation, test case generation, program inspections,black-box testing, white-box testing, GUI testing, and the use of testing tools. The prerequisite forCEN4072 is the data structures course. The grading policy for the course is based on 2 midtermexams (25 % each), a group project (25%), attendance and class participation (5%) and a finalexam (20%). The course is structured as a lecture section with no lab component, and students areexpected to work on the project outside of class on their own time, with some in class question ses-sions. The textbook currently used in the course is “Foundations of Software Testing”’ by Mathur[21]. Other reading material includes class notes and tutorials on testing tools.The
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Geraghty Anne Ellis, Georgia Institute of Technology; Nicholas Mulka, Georgia Institute of Technology; Amit Shashikant Jariwala, Georgia Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
have completecontrol over design implementation once requirements have been fully articulated. Prior analysis[5] indicates that RAD focuses on “incremental prototyping” of user-centric design that can bequickly released by small, yet diverse teams of developers, data architects, and solutionsdesigners, among others. Originated by James Martin in the early 1990s, RAD consists of“requirements planning, user design, construction, and cutover” [6]. This methodology isimplemented in LCNC platforms like Infinite Blue Platform, Mendix, and Salesforce. The low-code market is quickly growing; in 2017, Rymer [7] forecast the low-code developmentindustry’s market value to be over $21 billion by 2022, a 658% increase since 2016.LCNC offerings are hosted
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Kari L. Jordan Ph.D., The Carpentries; Marianne Corvellec, Institute for Globally Distributed Open Research and Education (IGDORE); Elizabeth D. Wickes, University of Illinois at Urbana-Champaign; Naupaka B. Zimmerman, University of San Francisco; Jonah M. Duckles, Software Carpentry; Tracy K. Teal, The Carpentries
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, intensivepractice, and skill mastery.Short-form (1-2 hour) workshops are often the most universal offering for training. They are theeasiest to book rooms for (or offer online as webinars), find instructors for, and create materialfor. For the participant, one hour is a reasonable amount of time to find in their day and there arerarely any follow-up requirements. Thus, there is very little risk of making a bad time investmentfor the learner, and the instructional team has a lot of flexibility in repeating the training andexperimenting with content. From research methods to retirement plans, this format is anexceptional platform for learners to explore new tools and services. Even though hands-onpractice can be quite limited in this format, this discovery
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Kristen Przyborski, University of New Haven; Frank Breitinger, University of New Haven; Lauren Beck, University of New Haven; Ronald S. Harichandran, University of New Haven
Tagged Divisions
Computing and Information Technology
coursetaught as a general education requirement and required for all students [16]. In the article,‘Planning for Computer Literacy’, Roger W. Haigh [10] discusses how colleges and universitieswould need to decide what computer literacy skills students would need for their careers andpersonal lives. Since then, universities have offered a variety of general education courses incomputer literacy and programming. Some existing courses that are part of the core focus onhighly technical skills, while others are aimed at educating students more generally. Recently,there has been a call for an expansion of computer literacy to include cyber literacy, safety, andsecurity [21, 22, 24]. Universities have begun to offer courses in cybersecurity
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
James K. Nelson Jr. P.E., Texas A&M University; Brent L. Donham, Texas A&M University-Commerce
Tagged Divisions
Computing and Information Technology
notification, and potentiallyinfluence the decision.Initial Planned OfferingsInitially three certificate and professional development courses are planned to be offered. Theseprograms are those indicated in the brown shaded box on Figure 5. The programs, which arecontained in the white paper entitled “Public-Private Training for Cybersecurity Professionals”[9] are:  Cybersecurity Specialist/Technician Upon successful completion of this program, the student will have demonstrated skills necessary to immediately enter the workplace and perform in an entry level cybersecurity specialist/technician position. During the program students will earn appropriate national certifications. This program is anticipated to be a one
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Alireza Kavianpour, DeVry University, Pomona; John Castellanos, DeVry University, Pomona; Adam Doty, DeVry University, Pomona; Michael Sweeting, DeVry University, Pomona; Isasio Velez, DeVry University, Pomona; Nathan Watson , DeVry University, Pomona
Tagged Divisions
Computing and Information Technology
the pandemic.Given current events and the potential of this project, it is easy to observe many applications forthis adaptable technology.8- References1- Buchla, D. M., & Floyd, T. L. DC/AC Fundamentals. Up Saddle River, NJ: Pearson, 2013.2- Mazidi, J. G., Mazidi, M. A., & McKinlay, R. D. The 8051 microcontroller and embeddedsystems: Using Assembly and C (2nd ed., Vol. 1). Prentice Hall, 2006.3- Herrick, M. Planning and maintaining hospital air isolation rooms, hfmmagazine.com, 2017.4- Falke, Rob. 'Doc’., Use the Air Changes Calculation to Determine Room CFMhttps://www.contractingbusiness.com/service/article/20868246/, 20165-“Airborne Infection Isolation Rooms.” Centers for Disease Control and Prevention, CDC,2020.6-Airborne infection
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Elizabeth Milonas, New York City College of Technology; Duo Li, Shenyang City University; Qiping Zhang, Long Island University
Tagged Divisions
Computing and Information Technology
more on the statistical and mathematical offerings while others on the computerand programming offerings. The goal of this research study is to evaluate associate and undergraduate data scienceprograms in the U.S. to identify similarities in course offerings and program structure among thecolleges examined. The research questions answered as a result of this study are: • RQ1: What are the characteristics of Data Science programs? • RQ2: What are the common core courses and competencies of data science associate and undergraduate programs?2.0 Literature Review2.1 Undergraduate Data Science Programs Several studies have focused on undergraduate data science programs and have maderecommendations regarding curriculum plans
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mark Dempsey, Collin County Community College ; Ann F Beheler, Collin County Community College
Tagged Divisions
Computing and Information Technology
Paper ID #26746Board 28: Working with Business and Industry to Update Nationwide ITSkill StandardsMark Dempsey, Collin County Community College Mark Dempsey joined Collin College in 2012 as program manager for the National Convergence Tech- nology Center. In his current position as Assistant Director, he plans and manages the CTC’s special programs and events as well as provides administrative and operational support to the CTC’s Principal Investigator. Prior to Collin College, Mark worked for eight years at UCLA Extension, the continuing education division of UCLA. There, he worked first as an assistant to the director
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Sanish Rai, West Virginia University Institute of Technology
Tagged Divisions
Computing and Information Technology
and parallel concepts. Student progress against the planned timeline willallow us to obtain a measure of the student learning in simulation modeling and parallel programming. Wehope to complete these works by next year.CONCLUSIONIn this work, we parallelized the sampling step of the SMC algorithm and were able to achieve up to 25%speedup in the runtime when using a machine with 8 cores. Currently, the convenience of converting aserial program to parallel and availability of multicore machines makes it quite sensible that the firstapproach to make any algorithm efficient is to take advantage of parallel computing. In the future, we planto run experiments in multi-cluster machines. We also plan to consider modifying the algorithm so that itcan
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Franz J. Kurfess, California Polytechnic State University, San Luis Obispo; Maria Pantoja, California Polytechnic State University, San Luis Obispo; Irene Humer, California Polytechnic State University, San Luis Obispo
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. This exposed our students tocollaborators among different fields, with their own terminology, goals, work methods andpractical approaches. Our paper reports on the initial experiment during the Fall 2019 term,involving two sections of an Artificial Intelligence class and one section of a Deep Learningclass. We are planning to continue this collaboration in the future.Keywords: Collaborative Learning, Interdisciplinary, Inter-Class teamwork 1. IntroductionStudents at California Polytechnic State University, San Luis Obispo (Cal Poly) are exposed topractical, hands-on educational activities throughout their course of studies, reflected by theuniversity’s “Learn by Doing” motto. In the Computer Science, Software Engineering andComputer
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Vigyan Jackson Chandra, Eastern Kentucky University
Tagged Divisions
Computing and Information Technology
Quality Enhancement Plan (QEP)critical thinking and reading initiatives at Eastern Kentucky University. Allowing students to beactive participants in their learning is a key driving force behind Boardnotes 2.0. It is aimed atinviting students to express their understanding in other modalities beyond text. Visual, verbal,and auditory expressions of our understanding allow others to view and hear it, allowing foreasier collaboration and growth. It keeps the content center stage while also allowing the light oftheir growing understanding of the discipline to shine. Learning gets a boost when students try toget the information out into the open and use it to solve problems, make decisions, reachpositions or conclusions, consider implications, apply
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Sami N. Rollins, University of San Francisco; Alark Joshi, University of San Francisco; Xornam Apedoe, University of San Francisco; Sophie Engle, University of San Francisco; Matthew Malensek; Gian Bruno, University of San Francisco
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
) early accessto research in the field, (ii) active learning in the classroom to conduct scientific thinking withtheir peers, and (iii) participating in learning communities [6] / study groups to benefit from peerlearning and community building.Lichtenstein et al. [7] found that when students find the learning environment to be academicallysupportive and encouraging, they are more likely to respond with a stronger commitment to theiracademic pursuit and degree completion. Wilson et al. [8] include “academic advising,interventions, and individualized development plans” from faculty advisors as one of the keyfactors that helps students in STEM fields build confidence and stay in the major. Cromley etal. [9] discuss similar themes in their work on
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Leslie Harvey III, University of Florida; Ashish Aggarwal, University of Florida
Tagged Divisions
Computing and Information Technology
personalized attention. Figure 1: Weekly plan of the CS1 flipped course Figure 1 shows the weekly plan of the class. Before students come to the weekly class sessionon Monday, they were expected to have watched all the weekly assigned lecture content and com-plete a quiz that tests the students on the content they learned. To take advantage of the benefits ofactive learning, students then worked on in-class programming activities enabling them to utilizethe availability of the instructor, teaching assistants, and peers to understand the concepts. Afterthe class, they were assigned a homework assignment, which was due on Friday. Students wererequired to attend class once a week on Mondays, every week of the semester. Overall
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Ciprian Popoviciu, East Carolina University; Philip J. Lunsford II, East Carolina University; John Pickard, East Carolina University; Colby Lee Sawyer, East Carolina University; Jarvis Woodburn; Zachary Ryan Zynda, East Carolina University; Dale Drummond, East Carolina University
Tagged Divisions
Computing and Information Technology
service self-management and joint managementby the stakeholders in this conferencing service.2. Problem DefinitionDepartment of Technology Systems at East Carolina University (ECU) received a grant from USDepartment of Agriculture (USDA) [3] to purchase Cisco WebEx boards [4] and deploy them to 12colleges and high schools across Eastern North Carolina to facilitate distance education (Figure 1).Figure 1. Footprint of the Planned Distance Education ServiceThis new service enables a more engaging, collaborative instructional experience involving students inmultiple classrooms across Eastern North Carolina and ECU instructors. The potential positive impact ofthis service is significant. The USDA grant covers the cost of the hardware and the WebEx
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Umit Karabiyik, Sam Houston State University; Naciye Celebi; Faruk Yildiz, Sam Houston State University; James Holekamp, Sam Houston State University; Khaled Rabieh, Sam Houston State University
Tagged Divisions
Computing and Information Technology
the ways in which attacker may exploit the vulnerability. • Stage three: Implement Immediate Risk Reduction: The goal in this stage is to identify the need for increasing the SCADA system’s defense mechanism. • Stage four: Implement Long-term Solutions: Once the attacks have been identified, it is important to find long-term solutions. It is also important to find a way to provide a security plan for the systems.During the course of this research project, we have focused on these four stages to attack andanalyze the SCADA system. As the SCADA system is a real-time system, forensic analysis weperform must be live analysis according to [3, 16, 4, 17].According to Ahmed et al. in [3, 16], state of the art digital forensic
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Naeem Seliya, Ohio Northern University; Heath Joseph LeBlanc, Ohio Northern University; J. Blake Hylton, Ohio Northern University; Ziad Youssfi, Ohio Northern University; Matthew Schweinefuss
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
rest of the paper is structured as follows. Section 2 presents the details of the QuestionFormulation Technique and its use in our study. Section 3 presents our proposed approach for thespecific problem identified in our overall project. Section 4 presents and discusses the empiricaldata mining results obtained. Section 5 provides a summary of our paper with a plan for futurework.2. The Question Formulation TechniqueThe ability to formulate salient questions is a critical life skill that enables the student to moredeeply engage with the content being learned. Questions serve the purpose of making clear andconcrete that which is unknown or misunderstood by the student. By making the unknownconcrete, a pathway for exploration, engagement and