and reliability at a possibly lower cost [2, 4].Wireless Sensor Network is an active area of research with various applications. Some of theapplications of WSNs includes homeland security, environmental monitoring, safety, health caresystem, monitoring of space assets for potential and human-made threats in space, ground-basedmonitoring of both land and water, intelligence gathering for defense, precision agriculture, ,civil structure monitoring, urban warfare, weather and climate analysis and prediction, battlefieldmonitoring and surveillance, exploration of the Solar System and beyond, monitoring of seismicacceleration, temperature, wind speed and GPS data [1, 4]. For each application area, there aredifferent technical issues that
Work-in-Progress: A Web-Based Tool to Assess Computational ThinkingAbstractWhen President Obama unveiled his plan to give all students in America the opportunity to learncomputer science [1], discussions about Computational Thinking (CT) began in earnest in manyorganizations across a wide range of disciplines. However, Jeannette Wing stated the importanceof CT for everyone a decade earlier in her landmark essay [2]. Since then, several people andorganizations have posted their own definition of CT, which presents a challenge in being able toassess CT understanding and awareness in people. In an effort to build consensus on how to bestassess CT, the authors have developed a web-based tool that will enable CT experts globally
receiving systems for electromagnetic wavescarrying information signals. In spring semester course they will also encounter applications ofdigital signal processing (DSP), for example digital filters, used in smartphones. This paper willfocus on the signal processing course.1. INTRODUCTION. In every engineering program there are courses with high mathematicalconcepts and abstractions. For example in electrical/computer programs courses such as controlsystems, electromagnetics, signal processing and communications, students have difficulty withconcepts such as transforms (Fourier, Laplace), bandwidth, signal-to-noise ratio, design ofvarious filters, convolution, and time/frequency domain representations of signals & systems. Inthe signal
recommendations on how SEP-CyLE should be implemented in classrooms.The main contributions of this work are as follows: 1. The cyberlearning environment or tool that was developed with funding from the NSF was considered to be useful and user friendly by students who used the tool. 2. Gamification was considered by students to be motivating. 3. Students suggested that the tool should be used as an integral part of the course rather than as an add-on.1 IntroductionEmployment outlook for students with computer science degrees is very good. The United StatesDepartment of Labor Statistics has predicted a 24% rise in employment for software developersin just ten years from 2016 to 2026 [1]. A highly-compensated career with high demand that
about different processes and things. ArduinoProgramming has introduced new features for writing codes that are deemed as user friendlywith unification of procedural and object-oriented portion of the language.Microcontroller and Subsystems OperationFigure 1 shows the Arduino sketch displaying the Parasitic Thermoelectric GeneratorComponent Diagram. The Arduino Uno micro-controller interfaces with 5V relay modulechannels switches and control components for applications such as 12V CPU Fans, 5Vvoltmeter, 5V low current Temperature Sensor, Grounding safety switch for 22V Peltier w/ 1Afuse load and Grounding safety switch for LM2596s Voltage regular. It is powered by a 12 VBattery that gets charged from a 22V max Peltier DC source
, using structured casestudy method, the study selects and analyses four typical cases conducted within Chinesecomputing education system, and subsequently extracts two paths named integrated path, andspecialized path for sustainable development of computing education. Differentcharacteristics of computing education models have been outlined and summarized as fourtypical paths which are underlying computing education. The concept of computingeducation is consequently refined and suggestions are put forward for various hierarchies likegovernment, university, and industry, to effectively improve the quality of talent cultivation incomputing education in China.1 IntroductionThe development of technology and society sparked reform and transformation
American Society for Engineering Education, 2019 Top Down and From Scratch - A hybrid Approach of Teaching Real Time Embedded Operating System Zhaohong Wang, Jing Guo California State University, Chico 1. INTRODUCTIONEmbedded system design and implementation is a key component in the undergraduate computerengineering curriculum. In an era of mobile and ubiquitous computing, a competent embeddeddevice should have a real-time operating system (RTOS) to make full use of its potentials and toaccommodate task needs. Deploying an RTOS also makes the programming job of embeddedsystem engineers easier. Instead of embedded system engineers writing their own code
activethroughout. Advantages and disadvantages of these two alternative patterns are explored, alongwith ideas for improving the latter algorithm. Some data is collected on a small cluster ofinexpensive consumer-grade hardware to explore the feasibility of this algorithm.Context The Fast Fourier Transform (FFT) is an algorithm for computing the Discrete FourierTransform (DFT) of a sequence of samples of a signal. The DFT of a signal in time or space is arepresentation of that signal in the frequency domain. The DFT is a useful tool in digital signalprocessing because it describes how a digital signal is made up of complex sinusoidal components.The 1-dimensional DFT of a signal y is defined aswhere N is the number of samples in the signal being
the growth of the Internet is nolonger in question. In fact, the last remnants of the global IPv4 address pools are already dryingup. As Table 1 shows, four of the five Regional Internet Registries (RIRs) have exhausted theirIPv4 address pools and are operating under exhaustion policies that restrict IPv4 addressallocations. Only the RIR for Africa, AFRINIC, has yet to reach full exhaustion. At the time ofwriting AFRINIC is allocating from its final /8 and has a projected exhaustion date of 09November 2019 [1].Table 1. Regional Internet Registry Last /8 Allocation Information. Last /8 Assignment RIR Description
among various process models and approaches were different, collectively, theyagreed in having a framework to embrace changes in IT/software and business process [41][42] .Information Technology Infrastructure Library (ITIL): In the early 1980s, the Britishgovernment pioneered ITIL, which later became one of the best-practice methods engagingpublic and private participants worldwide. ITIL earned its fame through a full sequence of stepsthe organizations could use to implement their IT processes to establish specific tasks such as“service desk, problem management, incident management, relationship management, andconfiguration management” [17, pp. 1-2]. Many organizations used ITIL as the acceptedframework; enabling IT managers utilize a series
as an agent in a givenenvironment, and the dynamic process of occupants is simulated over time to generate the complex andintriguing emergent behavior [1]. Graph-based models use the graph (node and edges) to represent thebuilding structure and model the occupancy dynamics using some flow or queuing network [2]. Whileagent-based simulation has the advantage of being able to represent each occupant’s behavior and decisionmaking in detail, computation cost increases proportionally with the number of agents and their agentsmaking it difficult to simulate large occupancy areas such as a game stadium, airports, rail terminals, etc.On the other hand, a graph-based model assumes occupants as a homogeneous mass and models their flowacross the graph
Education (NICE) Framework [1]. A list of secure coding practices wascompiled using two different resources: SEI CERT Coding Standard [2] and Open WebApplication Security Project (OWASP) [3]. The selected coding practices are applicable to C++and Java. Each secure coding practice is assigned a weight reflecting its importance and severity.We consider a set of 43 students’ programming assignments in C++ and Java, with all of thembeing anonymized for Personally Identifiable Information. Each assignment typically has differentcoding practices that are relevant, which is a result of the difference in requirements amongassignments. The problem description of each assignment is analyzed to determine the applicablesecure coding practices to each submitted
undesirable delays and network collision, increasingthe routing overhead.Routes in MANETs are selected using the shortest path metric, which is not a sufficientcondition to construct the best paths. Since the reliable data transmission is limited bydestructions due to physical properties of the channel: noise, path loss, multipath effect,interference, mobility, and limited transmission power, certain QoS will be required, to maintainthe routing.Related WorkIn [1], Novatnack at al. describe and analyze how the existing ad-hoc routing protocols, reactiveand proactive, differ in the mechanisms they use to select paths, detect broken links, and buffermessages during periods of link outage. But current routing protocols favor routing traffic basedon
and howthey can advance to more sophisticated scenarios. Like a computer game, students become excitedto improve their level of knowledge and go beyond a simple laboratory. They develop the datamodel, implement a base, then improve to intermediate and advanced models. Like a game, severalstudents often go beyond and develop additional scenarios of their own interest.1. IntroductionSimulation in education is a well-known and an established field. Engineering education, defensetraining, and medical exercises are a few noticeable examples. As part of the degree requirements,engineering students often learn how to use modeling and simulations for their future workplaces.Whether designing and constructing bridges, buildings, auto vehicles
from CACTI the one from SimpleScalar to get total numberof Access per second. Our results were scrutinized against others and found that in most cases theywere similar or slightly improved for multilevel cache associativity.1. Introduction Caches are high-speed buffers acting as local memories for CPU to store recently or mostfrequently accessed instructions and data fetched from RAM memory. A chase reduces the averageaccess time of the main memory as well fetch latencies. In recent CPUs caches have multi-levelsand associativity. The concept of multi-level cache is illustrated in Figure 1. The time taken toaccess the main memory can range from 300 to 600 nanoseconds while accessing the cache onlytakes 50 to 100 nanoseconds [1]. This is
regular curriculum. In 2014, Governor Terry McAuliffe (Commonwealthof Virginia) established the “Cyber Virginia and the Virginia Cyber Security Commission” withrecommendations that a cybersecurity workforce pipeline should start in K-12 education and thatvarious pathways should be developed and implemented across the Commonwealth. This paperwill provide an initial look into a project funded by the Department of Education that is focusedon the Career and Technical Education (CTE) pathways in Computer Science and Cybersecurity.It is the first year of implementation.IntroductionComputer science has been added to the science curricula on the high school level in theCommonwealth of Virginia in 2016 [1]. However, since there is high demand for a
self-driving car, also known as an autonomousvehicle (AV), connected and autonomous vehicle (CAV), driverless car, robo-car, or robotic caris a vehicle that is capable of sensing its environment and moving safely with little or no humaninput [1, 2, 3, 4].” “Self-driving cars combine a variety of sensors to perceive their surroundings,such as radar, lidar, sonar, GPS, odometry and inertial measurement units [1]. Advanced controlsystems interpret sensory information to identify appropriate navigation paths, as well asobstacles and relevant signage [5, 6, 7].” It can be said that autonomous vehicles are complexembedded devices.The area of autonomous vehicles goes back to at least the 1920s where the first radio-controlledvehicles were designed
gamblingcasinos. The Monte Carlo method (MCM), also known as the method of statistical trials is atraditional marriage of two major branches of theoretical physics the probabilistic theory ofrandom process dealing with Brownian motion or random walk experiments and potentialtheory, which studies the equilibrium states of a homogenous medium. It is a method ofapproximately solving problems using sequences of random numbers. It is a means of treatingmathematical problems by finding a probabilistic analog and then obtaining approximateanswers to this analog by some experimental sampling procedure.Monte Carlo methods have three characteristics: 1. Random sample generation 2. Known input distribution 3. Numerical experimentsThe direct output
Change of Major Policy and its EffectsAbstract: Considerable attention has been paid to factors affecting student's selection ofEngineering and related majors [1, 3, 5] and issues affecting retention and graduation in thesemajors [4, 7]. Lesser attention has been paid to change of major policies and their effects [2].We study the history and effects of "change of major" policies in the Erik Jonsson School ofEngineering and Computer Science at the University of Texas at Dallas. We further focus ontwo closely related degree programs (Computer Science and Computer Engineering) that aredelivered by different departments within the School. A university-wide policy that justrequired "good standing" to change major up to four years ago has evolved into
currently exists a dearth of tools for analyzing the curriculum thatincorporates course dependencies as defined by curriculum designers while also consideringstudents’ pathways through the curriculum. In this paper, we present Curri, a data-drivencurriculum visualization system that scrapes dependencies from our university’s publishedcurriculum and leverages student academic data to determine when, on average, students takeeach course. We evaluate our approach with a case study and two focus groups. This workprovides initial evidence that considering both dependencies and students’ temporal performanceleads to new analyses and insights.Figure 1: Curri, a curriculum visualization system that leverages curricular dependencies (pre-requisites) and
team, and Kali Linux. In this paper, we provideexamples on how students’ knowledge of CPS security changes over the course of the program,how students are supported in and out of the classroom towards advancing their knowledge in thisfield. We also highlight the impact that project-based and team coordinated learning can have onincreasing students’ understanding of the fundamentals of CPS security.IntroductionA recent study by Cybersecurity Ventures [1], a respected publisher of cybersecurity content,predicts that 3.5 million cybersecurity jobs around the world will be unfilled by 2021. In the UnitedStates, the demand for professionals with cybersecurity expertise is outpacing all other occupations[2]. These reports, along with many others
- physical security, and advancing cybersecurity education in multiple STEM fields. c American Society for Engineering Education, 2020 Cybersecurity Awareness and Training Through a Multidisciplinary OSINT Course Project1. IntroductionOpen Source Intelligence (OSINT) is “based on information which can be obtained legally andethically from public sources” [1]. OSINT has risen in value recently, as technological advanceshave increased the amount and accessibility of publicly available material [2], [3]. Open sourceintelligence can be used offensively, such as during the reconnaissance stage of a cyberattack [4],or defensively, as when private corporations use OSINT to find out their
, Service performance, Cisco WebEx Board, Raspberry PI, SaaS,Monitoring.Neither the entire paper nor any part of its content has been published or has beenaccepted for publication elsewhere. It has not been submitted to any other journal.1. IntroductionDistance Education is made possible by real time collaboration and interaction which in turn are enabledby a set of ever improving set of technologies and services. This evolution and these improvementsprovide the tools for delivering a very rich and effective learning experience regardless of thegeographical location of either students or expert instructors. Distance Education and DistanceCollaboration are particularly impactful in communities lacking the resources to provide access to
fromthe traditional remote lab approach in that the whole lab environment is virtualized and hosted ona commercial public cloud (GCP) with better availability, scalability and usability [1]. A studentsurvey was conducted anonymously to evaluate the hands-on labs and lab environments. Theoverall feedback was positive. The whole experience may be useful for other institutions that areinterested in adopting commercial, public cloud platforms in laboratory education.2. MOTIVATIONOur Information and Computer Technology program focuses on learning by doing. Hands-onlaboratory is always a vital part of the curriculum. Laboratory courses serve not only on-campus,face-to-face (F2F) students, but also online, distance education (DE) students
in hand. The presentation includesinformation about free and open-source software that allows annotations of electronicdocuments.KeywordsCritical reading, Annotation, Network diagrams, Icons, Symbols, Encode, Decode information,Visual thinkingIntroductionReading of any sort in general, and technical reading, in particular, naturally raises questionsabout the topics. It invites engagement and application of theory to practice. When students feelintrinsically compelled to add their notes next to examples or procedures in the text, they aregoing beyond merely reading it. Self-Determination Theory (SDT) [1] provides a framework forunderstanding how to promote motivation. By supporting the three basic psychological needs ofcompetence, autonomy
. 1,2017- Oct. 1. 2020) in September 2017. This paper describes the project goals,objectives, and expected outcomes as well as the steps taken to implement some of theproject activities. It should be noted that the project is a work in progress and thus itsimpact on the students and our CS program could not be currently evaluated due toinsufficient data. The effectiveness of the project will be measured annually by Octoberof each project year. We are planning to present the assessment results of this project in afuture article by 2020.Goal StatementThe primary goal of this project is to enhance the retention and graduation rates ofcomputer science students at FVSU through revising curriculum, implementing a peer-to-peer tutoring/mentoring, and
ofthe economy, from scientific investigation and engineering to finance, health, and nationalsecurity, demands a high quality professional computing workforce that includes the meaningfulparticipation of diverse perspectives and experiences. These perspectives and experiencesinform how personnel approach and solve a wide variety of difficult problems. Computingoccupations and degree programs, however, struggle with generating gender diversity. In 2015,only 18 percent of computing bachelor’s degree recipients were women, despite womencomprising 57 percent of bachelor’s degree recipients across disciplines [1]. Embeddingevidence-based interventions in a strategic plan is an effective approach to increasingenrollments and ultimately attaining
manner [8]. Radranovosky et al. provide a forensic investigation model for SCADA/ICSin [5]. These investigative steps are: Examination, Identification, Collection, and Documentation.In [23], Tina et al. propose a new forensic model which allows the investigator to carry out a fullforensic investigation on a SCADA/ICS by using the combination of cyber forensic and incidentresponse models. The forensic process given in [23] consists of the following phases:Phase 1- Identification and Preparation: This is the initial phase of the proposed forensicprocess and its purpose is to understand how the SCADA/ICS operates.Phase 2- Identifying data sources: This phase is one of the most important phases of the processbecause it deals with identifying
Dr. Emil H. Salib,and John D. Lester salibeh@jmu.edu, lesterjd@dukes.jmu,edu Dept of Integrated Science and Technology (ISAT), James Madison University (JMU), Harrisonburg, VA 228071 IntroductionThe origins of Software-Defined Networking (SDN) arose from graduate research work out ofStanford. A graduate student, Martin Casado, observed that the current network operations are hard[1], [2], [3]. He and his advisor took on this as an opportunity and defined a possible solution [4]that is now known as SDN. The cause of network operations problems is a rigid architecture. Thefirst problem is the contrast between the methods that determine the forwarding state
implementation are discussed and probable solutions are described. Lessons learned fromdifferent project milestones are detailed to highlight the advantages and disadvantages ofdifferent project paths adopted by the project team. Finally, recommendations to other teamswilling to create similar labs are presented.1 INTRODUCTIONWith advances in mobile standards, wireless technologies are getting more reliable. More usersare now dependent on wireless technologies for their business and recreational activities thanever before. This tremendously increase the amount of data transfer over mobile network. Aspper Cisco® global mobile data traffic forecast, data traffic grew 63 percent in 2016, 18-fold overthe past 5 years (Cisco®, 2017). These statistics