Asee peer logo
Displaying results 61 - 90 of 154 in total
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Kyle Joseph Wheelhouse, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
and reliability at a possibly lower cost [2, 4].Wireless Sensor Network is an active area of research with various applications. Some of theapplications of WSNs includes homeland security, environmental monitoring, safety, health caresystem, monitoring of space assets for potential and human-made threats in space, ground-basedmonitoring of both land and water, intelligence gathering for defense, precision agriculture, ,civil structure monitoring, urban warfare, weather and climate analysis and prediction, battlefieldmonitoring and surveillance, exploration of the Solar System and beyond, monitoring of seismicacceleration, temperature, wind speed and GPS data [1, 4]. For each application area, there aredifferent technical issues that
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Alka R. Harriger, Purdue University; Suyash Agrawal, Purdue University; Arjun Shakdher, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Work-in-Progress: A Web-Based Tool to Assess Computational ThinkingAbstractWhen President Obama unveiled his plan to give all students in America the opportunity to learncomputer science [1], discussions about Computational Thinking (CT) began in earnest in manyorganizations across a wide range of disciplines. However, Jeannette Wing stated the importanceof CT for everyone a decade earlier in her landmark essay [2]. Since then, several people andorganizations have posted their own definition of CT, which presents a challenge in being able toassess CT understanding and awareness in people. In an effort to build consensus on how to bestassess CT, the authors have developed a web-based tool that will enable CT experts globally
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Seyed Mousavinezhad, Idaho State University; Cheryl Xu, North Carolina State University
Tagged Divisions
Computing and Information Technology
receiving systems for electromagnetic wavescarrying information signals. In spring semester course they will also encounter applications ofdigital signal processing (DSP), for example digital filters, used in smartphones. This paper willfocus on the signal processing course.1. INTRODUCTION. In every engineering program there are courses with high mathematicalconcepts and abstractions. For example in electrical/computer programs courses such as controlsystems, electromagnetics, signal processing and communications, students have difficulty withconcepts such as transforms (Fourier, Laplace), bandwidth, signal-to-noise ratio, design ofvarious filters, convolution, and time/frequency domain representations of signals & systems. Inthe signal
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Debra M. Duke, Virginia Commonwealth University; Mandayam Thirunarayanan, Florida International University; Abigail Byram, Virginia Commonwealth University; Peter J. Clarke, Florida International University
Tagged Divisions
Computing and Information Technology
recommendations on how SEP-CyLE should be implemented in classrooms.The main contributions of this work are as follows: 1. The cyberlearning environment or tool that was developed with funding from the NSF was considered to be useful and user friendly by students who used the tool. 2. Gamification was considered by students to be motivating. 3. Students suggested that the tool should be used as an integral part of the course rather than as an add-on.1 IntroductionEmployment outlook for students with computer science degrees is very good. The United StatesDepartment of Labor Statistics has predicted a 24% rise in employment for software developersin just ten years from 2016 to 2026 [1]. A highly-compensated career with high demand that
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Eliezer Ochoa Jr.; Joshua David De Piano; Michael G. Milford; Alan Moses Galvan; Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing and Information Technology
about different processes and things. ArduinoProgramming has introduced new features for writing codes that are deemed as user friendlywith unification of procedural and object-oriented portion of the language.Microcontroller and Subsystems OperationFigure 1 shows the Arduino sketch displaying the Parasitic Thermoelectric GeneratorComponent Diagram. The Arduino Uno micro-controller interfaces with 5V relay modulechannels switches and control components for applications such as 12V CPU Fans, 5Vvoltmeter, 5V low current Temperature Sensor, Grounding safety switch for 22V Peltier w/ 1Afuse load and Grounding safety switch for LM2596s Voltage regular. It is powered by a 12 VBattery that gets charged from a 22V max Peltier DC source
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Zhengze Lyu, Zhejiang University; Wei Zhang, Zhejiang University; Yixue Zhuang, Zhejiang University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, using structured casestudy method, the study selects and analyses four typical cases conducted within Chinesecomputing education system, and subsequently extracts two paths named integrated path, andspecialized path for sustainable development of computing education. Differentcharacteristics of computing education models have been outlined and summarized as fourtypical paths which are underlying computing education. The concept of computingeducation is consequently refined and suggestions are put forward for various hierarchies likegovernment, university, and industry, to effectively improve the quality of talent cultivation incomputing education in China.1 IntroductionThe development of technology and society sparked reform and transformation
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Zhaohong Wang, California State University, Chico; Jing Guo, California State University, Chico
Tagged Divisions
Computing and Information Technology
American Society for Engineering Education, 2019 Top Down and From Scratch - A hybrid Approach of Teaching Real Time Embedded Operating System Zhaohong Wang, Jing Guo California State University, Chico 1. INTRODUCTIONEmbedded system design and implementation is a key component in the undergraduate computerengineering curriculum. In an era of mobile and ubiquitous computing, a competent embeddeddevice should have a real-time operating system (RTOS) to make full use of its potentials and toaccommodate task needs. Deploying an RTOS also makes the programming job of embeddedsystem engineers easier. Instead of embedded system engineers writing their own code
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afrin Naz, West Virginia University Institute of Technology.; Mardigon Max Toler, West Virginia University Institute of Technology
Tagged Divisions
Computing and Information Technology
activethroughout. Advantages and disadvantages of these two alternative patterns are explored, alongwith ideas for improving the latter algorithm. Some data is collected on a small cluster ofinexpensive consumer-grade hardware to explore the feasibility of this algorithm.Context The Fast Fourier Transform (FFT) is an algorithm for computing the Discrete FourierTransform (DFT) of a sequence of samples of a signal. The DFT of a signal in time or space is arepresentation of that signal in the frequency domain. The DFT is a useful tool in digital signalprocessing because it describes how a digital signal is made up of complex sinusoidal components.The 1-dimensional DFT of a signal y is defined aswhere N is the number of samples in the signal being
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Dale Drummond, East Carolina University; Philip J. Lunsford II, East Carolina University; Ciprian Popoviciu
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
the growth of the Internet is nolonger in question. In fact, the last remnants of the global IPv4 address pools are already dryingup. As Table 1 shows, four of the five Regional Internet Registries (RIRs) have exhausted theirIPv4 address pools and are operating under exhaustion policies that restrict IPv4 addressallocations. Only the RIR for Africa, AFRINIC, has yet to reach full exhaustion. At the time ofwriting AFRINIC is allocating from its final /8 and has a projected exhaustion date of 09November 2019 [1].Table 1. Regional Internet Registry Last /8 Allocation Information. Last /8 Assignment RIR Description
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, Florida Institute of Technology; Khalil A. Said, Davenport University; Ghaythah Abdullah Alqarna
Tagged Divisions
Computing and Information Technology
among various process models and approaches were different, collectively, theyagreed in having a framework to embrace changes in IT/software and business process [41][42] .Information Technology Infrastructure Library (ITIL): In the early 1980s, the Britishgovernment pioneered ITIL, which later became one of the best-practice methods engagingpublic and private participants worldwide. ITIL earned its fame through a full sequence of stepsthe organizations could use to implement their IT processes to establish specific tasks such as“service desk, problem management, incident management, relationship management, andconfiguration management” [17, pp. 1-2]. Many organizations used ITIL as the acceptedframework; enabling IT managers utilize a series
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Sanish Rai, West Virginia University Institute of Technology
Tagged Divisions
Computing and Information Technology
as an agent in a givenenvironment, and the dynamic process of occupants is simulated over time to generate the complex andintriguing emergent behavior [1]. Graph-based models use the graph (node and edges) to represent thebuilding structure and model the occupancy dynamics using some flow or queuing network [2]. Whileagent-based simulation has the advantage of being able to represent each occupant’s behavior and decisionmaking in detail, computation cost increases proportionally with the number of agents and their agentsmaking it difficult to simulate large occupancy areas such as a game stadium, airports, rail terminals, etc.On the other hand, a graph-based model assumes occupants as a homogeneous mass and models their flowacross the graph
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Saeed Al-Haj, Ohio Northern University; Naeem Seliya Ph.D., Ohio Northern University; Collin Lee Kemner, Ohio Northern University
Tagged Divisions
Computing and Information Technology
Education (NICE) Framework [1]. A list of secure coding practices wascompiled using two different resources: SEI CERT Coding Standard [2] and Open WebApplication Security Project (OWASP) [3]. The selected coding practices are applicable to C++and Java. Each secure coding practice is assigned a weight reflecting its importance and severity.We consider a set of 43 students’ programming assignments in C++ and Java, with all of thembeing anonymized for Personally Identifiable Information. Each assignment typically has differentcoding practices that are relevant, which is a result of the difference in requirements amongassignments. The problem description of each assignment is analyzed to determine the applicablesecure coding practices to each submitted
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Merlinda Drini, Queensborough Community College of the City University of New York
Tagged Divisions
Computing and Information Technology
undesirable delays and network collision, increasingthe routing overhead.Routes in MANETs are selected using the shortest path metric, which is not a sufficientcondition to construct the best paths. Since the reliable data transmission is limited bydestructions due to physical properties of the channel: noise, path loss, multipath effect,interference, mobility, and limited transmission power, certain QoS will be required, to maintainthe routing.Related WorkIn [1], Novatnack at al. describe and analyze how the existing ad-hoc routing protocols, reactiveand proactive, differ in the mechanisms they use to select paths, detect broken links, and buffermessages during periods of link outage. But current routing protocols favor routing traffic basedon
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Hassan Rajaei, Bowling Green State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
and howthey can advance to more sophisticated scenarios. Like a computer game, students become excitedto improve their level of knowledge and go beyond a simple laboratory. They develop the datamodel, implement a base, then improve to intermediate and advanced models. Like a game, severalstudents often go beyond and develop additional scenarios of their own interest.1. IntroductionSimulation in education is a well-known and an established field. Engineering education, defensetraining, and medical exercises are a few noticeable examples. As part of the degree requirements,engineering students often learn how to use modeling and simulations for their future workplaces.Whether designing and constructing bridges, buildings, auto vehicles
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Hassan Rajaei, Bowling Green State University
Tagged Divisions
Computing and Information Technology
from CACTI the one from SimpleScalar to get total numberof Access per second. Our results were scrutinized against others and found that in most cases theywere similar or slightly improved for multilevel cache associativity.1. Introduction Caches are high-speed buffers acting as local memories for CPU to store recently or mostfrequently accessed instructions and data fetched from RAM memory. A chase reduces the averageaccess time of the main memory as well fetch latencies. In recent CPUs caches have multi-levelsand associativity. The concept of multi-level cache is illustrated in Figure 1. The time taken toaccess the main memory can range from 300 to 600 nanoseconds while accessing the cache onlytakes 50 to 100 nanoseconds [1]. This is
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Vukica M. Jovanovic, Old Dominion University; Murat Kuzlu, Old Dominion University; Otilia Popescu, Old Dominion University; Abdul Rahman Badawi, Old Dominion University; Deborah Kay Marshall, Norfolk Public Schools; Salih Sarp, Old Dominion University; Spyridoula Tsouganatou, Old Dominion University; Petros J. Katsioloudis, Old Dominion University; Linda Vahala, Old Dominion University; Hongyi Michael Wu, Old Dominion University
Tagged Divisions
Computing and Information Technology
regular curriculum. In 2014, Governor Terry McAuliffe (Commonwealthof Virginia) established the “Cyber Virginia and the Virginia Cyber Security Commission” withrecommendations that a cybersecurity workforce pipeline should start in K-12 education and thatvarious pathways should be developed and implemented across the Commonwealth. This paperwill provide an initial look into a project funded by the Department of Education that is focusedon the Career and Technical Education (CTE) pathways in Computer Science and Cybersecurity.It is the first year of implementation.IntroductionComputer science has been added to the science curricula on the high school level in theCommonwealth of Virginia in 2016 [1]. However, since there is high demand for a
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Benjamin Chambers
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
self-driving car, also known as an autonomousvehicle (AV), connected and autonomous vehicle (CAV), driverless car, robo-car, or robotic caris a vehicle that is capable of sensing its environment and moving safely with little or no humaninput [1, 2, 3, 4].” “Self-driving cars combine a variety of sensors to perceive their surroundings,such as radar, lidar, sonar, GPS, odometry and inertial measurement units [1]. Advanced controlsystems interpret sensory information to identify appropriate navigation paths, as well asobstacles and relevant signage [5, 6, 7].” It can be said that autonomous vehicles are complexembedded devices.The area of autonomous vehicles goes back to at least the 1920s where the first radio-controlledvehicles were designed
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona
Tagged Divisions
Computing and Information Technology
gamblingcasinos. The Monte Carlo method (MCM), also known as the method of statistical trials is atraditional marriage of two major branches of theoretical physics the probabilistic theory ofrandom process dealing with Brownian motion or random walk experiments and potentialtheory, which studies the equilibrium states of a homogenous medium. It is a method ofapproximately solving problems using sequences of random numbers. It is a means of treatingmathematical problems by finding a probabilistic analog and then obtaining approximateanswers to this analog by some experimental sampling procedure.Monte Carlo methods have three characteristics: 1. Random sample generation 2. Known input distribution 3. Numerical experimentsThe direct output
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Simeon Ntafos, University of Texas at Dallas
Tagged Divisions
Computing and Information Technology
Change of Major Policy and its EffectsAbstract: Considerable attention has been paid to factors affecting student's selection ofEngineering and related majors [1, 3, 5] and issues affecting retention and graduation in thesemajors [4, 7]. Lesser attention has been paid to change of major policies and their effects [2].We study the history and effects of "change of major" policies in the Erik Jonsson School ofEngineering and Computer Science at the University of Texas at Dallas. We further focus ontwo closely related degree programs (Computer Science and Computer Engineering) that aredelivered by different departments within the School. A university-wide policy that justrequired "good standing" to change major up to four years ago has evolved into
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephen Michael MacNeil, University of California, San Diego; Mohsen M. Dorodchi, University of North Carolina at Charlotte; Erfan Al-Hossami, University of North Carolina at Charlotte; Aileen Benedict, University of North Carolina at Charlotte; Devansh Desai, University of North Carolina at Charlotte; Mohammad Javad Mahzoon, Core Compete Inc.
Tagged Divisions
Computing and Information Technology
currently exists a dearth of tools for analyzing the curriculum thatincorporates course dependencies as defined by curriculum designers while also consideringstudents’ pathways through the curriculum. In this paper, we present Curri, a data-drivencurriculum visualization system that scrapes dependencies from our university’s publishedcurriculum and leverages student academic data to determine when, on average, students takeeach course. We evaluate our approach with a case study and two focus groups. This workprovides initial evidence that considering both dependencies and students’ temporal performanceleads to new analyses and insights.Figure 1: Curri, a curriculum visualization system that leverages curricular dependencies (pre-requisites) and
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Sin Ming Loo, Boise State University; Liljana Babinkostova
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
team, and Kali Linux. In this paper, we provideexamples on how students’ knowledge of CPS security changes over the course of the program,how students are supported in and out of the classroom towards advancing their knowledge in thisfield. We also highlight the impact that project-based and team coordinated learning can have onincreasing students’ understanding of the fundamentals of CPS security.IntroductionA recent study by Cybersecurity Ventures [1], a respected publisher of cybersecurity content,predicts that 3.5 million cybersecurity jobs around the world will be unfilled by 2021. In the UnitedStates, the demand for professionals with cybersecurity expertise is outpacing all other occupations[2]. These reports, along with many others
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alyssa Mendlein, Temple University; Thuy-Trinh Nguyen, Temple University ; Aunshul Rege, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
- physical security, and advancing cybersecurity education in multiple STEM fields. c American Society for Engineering Education, 2020 Cybersecurity Awareness and Training Through a Multidisciplinary OSINT Course Project1. IntroductionOpen Source Intelligence (OSINT) is “based on information which can be obtained legally andethically from public sources” [1]. OSINT has risen in value recently, as technological advanceshave increased the amount and accessibility of publicly available material [2], [3]. Open sourceintelligence can be used offensively, such as during the reconnaissance stage of a cyberattack [4],or defensively, as when private corporations use OSINT to find out their
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Ciprian Popoviciu, East Carolina University; Philip J. Lunsford II, East Carolina University; John Pickard, East Carolina University; Colby Lee Sawyer, East Carolina University; Jarvis Woodburn; Zachary Ryan Zynda, East Carolina University; Dale Drummond, East Carolina University
Tagged Divisions
Computing and Information Technology
, Service performance, Cisco WebEx Board, Raspberry PI, SaaS,Monitoring.Neither the entire paper nor any part of its content has been published or has beenaccepted for publication elsewhere. It has not been submitted to any other journal.1. IntroductionDistance Education is made possible by real time collaboration and interaction which in turn are enabledby a set of ever improving set of technologies and services. This evolution and these improvementsprovide the tools for delivering a very rich and effective learning experience regardless of thegeographical location of either students or expert instructors. Distance Education and DistanceCollaboration are particularly impactful in communities lacking the resources to provide access to
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Peng Li, East Carolina University
Tagged Divisions
Computing and Information Technology
fromthe traditional remote lab approach in that the whole lab environment is virtualized and hosted ona commercial public cloud (GCP) with better availability, scalability and usability [1]. A studentsurvey was conducted anonymously to evaluate the hands-on labs and lab environments. Theoverall feedback was positive. The whole experience may be useful for other institutions that areinterested in adopting commercial, public cloud platforms in laboratory education.2. MOTIVATIONOur Information and Computer Technology program focuses on learning by doing. Hands-onlaboratory is always a vital part of the curriculum. Laboratory courses serve not only on-campus,face-to-face (F2F) students, but also online, distance education (DE) students
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Vigyan Jackson Chandra, Eastern Kentucky University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
in hand. The presentation includesinformation about free and open-source software that allows annotations of electronicdocuments.KeywordsCritical reading, Annotation, Network diagrams, Icons, Symbols, Encode, Decode information,Visual thinkingIntroductionReading of any sort in general, and technical reading, in particular, naturally raises questionsabout the topics. It invites engagement and application of theory to practice. When students feelintrinsically compelled to add their notes next to examples or procedures in the text, they aregoing beyond merely reading it. Self-Determination Theory (SDT) [1] provides a framework forunderstanding how to promote motivation. By supporting the three basic psychological needs ofcompetence, autonomy
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State University; Xiangyan Zeng, Fort Valley State University; Chunhua Dong, Fort Valley State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. 1,2017- Oct. 1. 2020) in September 2017. This paper describes the project goals,objectives, and expected outcomes as well as the steps taken to implement some of theproject activities. It should be noted that the project is a work in progress and thus itsimpact on the students and our CS program could not be currently evaluated due toinsufficient data. The effectiveness of the project will be measured annually by Octoberof each project year. We are planning to present the assessment results of this project in afuture article by 2020.Goal StatementThe primary goal of this project is to enhance the retention and graduation rates ofcomputer science students at FVSU through revising curriculum, implementing a peer-to-peer tutoring/mentoring, and
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Zhen Wu, University of Colorado, Boulder; Christopher Lynnly Hovey, University of Colorado, Boulder; Leisa D. Thompson, University of Virginia
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
ofthe economy, from scientific investigation and engineering to finance, health, and nationalsecurity, demands a high quality professional computing workforce that includes the meaningfulparticipation of diverse perspectives and experiences. These perspectives and experiencesinform how personnel approach and solve a wide variety of difficult problems. Computingoccupations and degree programs, however, struggle with generating gender diversity. In 2015,only 18 percent of computing bachelor’s degree recipients were women, despite womencomprising 57 percent of bachelor’s degree recipients across disciplines [1]. Embeddingevidence-based interventions in a strategic plan is an effective approach to increasingenrollments and ultimately attaining
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Umit Karabiyik, Sam Houston State University; Naciye Celebi; Faruk Yildiz, Sam Houston State University; James Holekamp, Sam Houston State University; Khaled Rabieh, Sam Houston State University
Tagged Divisions
Computing and Information Technology
manner [8]. Radranovosky et al. provide a forensic investigation model for SCADA/ICSin [5]. These investigative steps are: Examination, Identification, Collection, and Documentation.In [23], Tina et al. propose a new forensic model which allows the investigator to carry out a fullforensic investigation on a SCADA/ICS by using the combination of cyber forensic and incidentresponse models. The forensic process given in [23] consists of the following phases:Phase 1- Identification and Preparation: This is the initial phase of the proposed forensicprocess and its purpose is to understand how the SCADA/ICS operates.Phase 2- Identifying data sources: This phase is one of the most important phases of the processbecause it deals with identifying
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Emil H. Salib, James Madison University; John David Lester
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Dr. Emil H. Salib,and John D. Lester salibeh@jmu.edu, lesterjd@dukes.jmu,edu Dept of Integrated Science and Technology (ISAT), James Madison University (JMU), Harrisonburg, VA 228071 IntroductionThe origins of Software-Defined Networking (SDN) arose from graduate research work out ofStanford. A graduate student, Martin Casado, observed that the current network operations are hard[1], [2], [3]. He and his advisor took on this as an opportunity and defined a possible solution [4]that is now known as SDN. The cause of network operations problems is a rigid architecture. Thefirst problem is the contrast between the methods that determine the forwarding state
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
implementation are discussed and probable solutions are described. Lessons learned fromdifferent project milestones are detailed to highlight the advantages and disadvantages ofdifferent project paths adopted by the project team. Finally, recommendations to other teamswilling to create similar labs are presented.1 INTRODUCTIONWith advances in mobile standards, wireless technologies are getting more reliable. More usersare now dependent on wireless technologies for their business and recreational activities thanever before. This tremendously increase the amount of data transfer over mobile network. Aspper Cisco® global mobile data traffic forecast, data traffic grew 63 percent in 2016, 18-fold overthe past 5 years (Cisco®, 2017). These statistics