Asee peer logo
Displaying results 91 - 120 of 132 in total
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State University; Xiangyan Zeng, Fort Valley State University; Chunhua Dong, Fort Valley State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
/mentoring sessions and regularly communicating with the course professors and project director about their tutoring/mentoring activities. To further enhance the communication between tutors and course instructors as well as to better familiarize the tutors with the students and class activities, the tutors would be required to attend 2 to 3 classes per week (maximum 3 hours/week) for the course(s) they tutor. The attendance in these classes would be considered as part of their tutoring load.  Identify at least 5 qualified students for tutoring/mentoring task. These students have performed at least at a level of B or better in the gate keeping courses, have junior/senior standing, and have a GPA of at
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Dale Drummond, East Carolina University; Philip J. Lunsford II, East Carolina University; Ciprian Popoviciu, Nephos6, Inc.
Tagged Divisions
Computing and Information Technology
allowing the synthetic transaction to follow the same path that is taken by thestudent's and teacher's sessions when accessing the cloud-based resource.After the solution for the authentication of the web filtering application is verified, the agentdeployment will be expanded to the additional schools, with the final goal of having multipleagents deployed at each school in the school district, the school district’s central office and theirInternet Service Provider.© American Society for Engineering Education, 2018 2018 ASEE National ConferenceReferences[1] S. Stein, J. Ware, J. Laboy, H. E. Schaffer, “Improving K-12 pedagogy via a Cloud designed for education,” International Journal of Information Management
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Nikunja Swain P.E., South Carolina State University; Biswajit Biswal, South Carolina State University
Tagged Divisions
Computing and Information Technology
(Feb. 2005).[2]. State of Cybersecurity: Implications for 2016 - An ISACA and RSA Conference Survey. Retrieved from https://www.isaca.org/cyber/Documents/state-of-cybersecurity_res_eng_0316.pdf[3]. Top U.S Universities failing at Cybersecurity Education. Retrieved from https://www.cio.com/article/3060813/it-skills-training/top-u-s-universities-failing-at-cybersecurity- education.html[4]. Can higher education fix the cybersecurity shortfall? – Retrieved from http://www.schools.com/articles/cybersecurity-shortfall[5]. D. Rowe, B. Lunt, J. Ekstorm, “The Role of Cyber-Security in Information Technology Education” - SIGITE’11, October 20–22, 2011. 3[6]. Cybersecurity job market to suffer severe workforce shortage. Retrieved from
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Xiaoyan Gong, Institute of Smart Education, Qingdao Academy of Intelligent Industries. ; Liang Zhao, Faculty of Information Technology, Beijing University of Technology; RenHao Tang, Faculty of Information Technology, Beijing University of Technology; YaNa Guo, Faculty of InformationTechnology,Beijing University of Technology; Xiwei Liu, Qingdao Academy of Intelligent Industries; Institute of Automation, Chinese Academy of Sciences; Jian He, Faculty of Information Technology, Beijing University of Technology; Fei-Yue Wang, National Key Laboratory of Management and Control for Complex Systems, Chinese Academy of Sciences; Ying Tang, Rowan University; Wanruo Shi, Beijing Normal University; Xiaojie Niu, Beijing Normal University; Xinzhu Wang, Beijing Normal University
Tagged Divisions
Computing and Information Technology
. Elliot, W. Crumpler, and K. Lloyd, “A National Machine Intelligence Strategy for the United States.”Report of the CSIS technology policy program, 2018. [2] China, the State Council, “New Generation Artificial Intelligence Development Plan,”2017. [3] X. Han, X. Liu, F. Hu, et al, “Design of AI+ Curriculum for Primary and Secondary Schools in Qingdao,” Proceedings of 2018 Chinese Automation Congress, Nov.30-Dec. 2, 2018, Xi’An, China, [4] F. Wang, and J .S. Lansin, “From Artificial Life to Artificial Societies--New Methods for Studies of Complex Social Systems,” Complex Systems and Complexity Science, Vol. 1, No. 1, pp. 33-41,2004. [5]F. Wang, “Parallel system methods for management and control of complex systems. Control and Decision
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, Mississippi State University
Tagged Divisions
Computing and Information Technology
and other activities.References1. A. Behrouzi, and D. Kuchma (2016, June), Inquiry-Based Learning to Explore the Design of the Built Environment Paper, 2016 ASEE (American Society for Engineering Education) Annual Conference & Exposition, New Orleans, Louisiana. 10.18260/p.25725.2. S. Khorbotly (2015, June), A Project-based Learning Approach to Teaching Computer Vision at the Undergraduate Level Paper, 2015 ASEE Annual Conference & Exposition, Seattle, Washington. 10.18260/p.23432.3. J. Wang, C. Luo, W. Zhao, and X. Li (2017, June), Empowering Students with Self- Regulation in a Project-Based Embedded Systems Course, 124th ASEE Annual Conference & Exposition (ASEE'2017), June 25 - 28, 2017, Columbus, Ohio.4. W
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Natasha Smith P.E., University of Virginia
Tagged Divisions
Computing and Information Technology
web-based environment for administering computer assignments. The platform is effectiveand easy to use as long as some attention is given in crafting the problem statement and estab-lishing grading rubrics. Two additional tools that were instrumental for the course included thecombination of video recording (Panopto) with live notes using PDFAnnotator on a smart screen.In addition, the video-conferencing app, Zoom, enabled live participation in the class from onlinestudents and online office hours. Finally, the LMS provided an adequate environment to collectcourse resources, communicate information, and exchange assignments.References 1 B. S. Bloom; J. T. Hastings: and G. Madaus. Handbook on formative and summative evaluation of student
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Radana Dvorak, University of Portland; Heather Dillon, University of Portland; Nicole Ralston, University of Portland; Jeffrey Matthew Welch, University of Portland
Tagged Divisions
Computing and Information Technology
serve as a reference for enhancing student thinking about ethics of hacking.AcknowledgementsThanks to the W.M. Keck Foundation for funding this study. Thanks to the many undergraduatestudents who made this project and paper possible.References1. KEEN. KEEN - The Framework [Internet]. [cited 2020 Jan 16]. Available from: https://engineeringunleashed.com/mindset-matters/framework.aspx2. Gentile MC. Giving Voice to Values: How to Speak Your Mind When You Know What?s Right [Internet]. Yale University Press; 2010 [cited 2015 Mar 30]. 256 p. Available from: http://books.google.com/books/about/Giving_Voice_to_Values.html?id=Y7yrKBVflgkC &pgis=13. Logan PY, Clarkson A. Teaching students to hack: curriculum issues in
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alyssa Mendlein, Temple University; Thuy-Trinh Nguyen, Temple University ; Aunshul Rege, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
board for guiding us to ensure that this project wouldbe safe, ethical and fun for all those involved. This material is supported by the National ScienceFoundation Award No. 1453040.8. References[1] R. D. Steele, “The importance of open source intelligence to the military,” International Journal of Intelligence and Counter Intelligence, vol. 8, no. 4, pp. 457-470, 1995.[2] S. Mercado, “Sailing the sea of OSINT in the information age,” Studies in Intelligence, vol. 43, no. 3, pp. 45-55, 2009.[3] D. R. Hayes and F. Cappa, “Open-source intelligence for risk assessment,” Business Horizons, vol. 61, no. 5, pp. 689-697, 2018.[4] A. K. Sood and R. J. Enbody, “Targeted cyberattacks: a superset of advanced persistent threats,” IEEE
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Ciprian Popoviciu, East Carolina University; Philip J. Lunsford II, East Carolina University; John Pickard, East Carolina University; Colby Lee Sawyer, East Carolina University; Jarvis Woodburn; Zachary Ryan Zynda, East Carolina University; Dale Drummond, East Carolina University
Tagged Divisions
Computing and Information Technology
Conference4. Cisco WebEx Board, https://www.cisco.com/c/en/us/products/collaboration-endpoints/webex-board/index.html5. Cisco WebEx conferencing service, https://www.webex.com6. C. Popoviciu, P. Lunsford, J. Pickard, C. Sawyer, S. Wear, S. Lee, D. Drummond, " Deploying EdgeComputing to Augment Endpoint Functionality", Submitted to 2020 ASEE Annual Conference7. G. Aceto, A. Botta, W. de Donato, A. Pescape, "Cloud Monitoring: A Survey", Elsevier, vol 57, issue 9,p. 2093-2115 (2013)8. J. Edwards, "Data Silos: Now and Forever?" https://www.informationweek.com/strategic-cio/it-strategy/data-silos-now-and-forever/a/d-id/13332469. L.Skorin-Karpov, M. Varela, T. Hoßfeld, K. Chen, "A Survey of Emerging Concepts and Challenges forQoE Management of Multimedia
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Elizabeth Milonas, New York City College of Technology; Duo Li, Shenyang City University; Qiping Zhang, Long Island University
Tagged Divisions
Computing and Information Technology
://www.datasciencedegreeprograms.net/rankings/affordable-bachelors/ • https://blog.collegevine.com/the-list-of-all-u-s-colleges-with-a-data-science-major/ • https://www.usnews.com/best-colleges/rankings/computer-science/data-analytics- science3.3 Datasets A total of 171 undergraduate Data Science programs were initially crawled, but only 136programs were evaluated for this study. 35 undergraduate programs were omitted from theanalysis due to the following: • no data science courses were evident in the list of core requirements for the program • only a graduate degree was offered • only a Data Science minor was offered. No Data Science major was offered. Each institution’s course offering as listed on the institution’s website, department
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Michael Oudshoorn, Northwest Missouri State University; Rajendra K. Raj, Rochester Institute of Technology; Stan Thomas, Wake Forest University; Allen Parrish, United States Naval Academy
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Briana Marie Bailey; Yujian Fu P.E., Alabama A&M University
Tagged Divisions
Computing and Information Technology
andSystem Implementation in Section 5. Discussion and conclusion are given in Section 6. 2. Related WorksFor many institutes, a student self-server or student information system or SIS, typicallyencounters bugs and glitches due to poor configuration as well as an increasing number ofstudents. With a vase amount of data, a student information system can experience systemoutages which can result in the student(s) not being able to retrieve specific information in atimely manner.As SIS begins to increase throughout numerous campuses, an ongoing issue steadily arises. Thecost to successfully build, test, and implement is relatively high. For most institutes, the cost canrange from 500,000 to several million dollars. However, the main question is “Is
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Vukica M. Jovanovic, Old Dominion University; Murat Kuzlu, Old Dominion University; Otilia Popescu, Old Dominion University; Abdul Rahman Badawi, Old Dominion University; Deborah Kay Marshall, Norfolk Public Schools; Salih Sarp, Old Dominion University; Spyridoula Tsouganatou, Old Dominion University; Petros J. Katsioloudis, Old Dominion University; Linda Vahala, Old Dominion University; Hongyi Michael Wu, Old Dominion University
Tagged Divisions
Computing and Information Technology
Education Virginia Department of Education, Richmond, Virginia, 2016, [Online]. Available: http://www.doe.virginia.gov/instruction/career_technical/cybersecurity/cybersecurity- white-paper.pdf, [Accessed Jan. 16, 2020].[2] Virginia Department of Education. “Computer Science Standards of Learning (SOL)”, Computer Science, Virginia Department of Education, 2017, [Online]. Available: http://www.doe.virginia.gov/testing/sol/standards_docs/computer-science/index.shtml, [Accessed Jan. 16, 2020].[3] S. B., Fee, A. M. Holland-Minkley. “Teaching computer science through problems, not solutions”. Computer Science Education, 2010. vol. 20. no. 2. pp. 129-144.[4] Code.org. Hadi Partovi, Code.org, 2019, [Online
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andrew R. Schmitt, Metropolitan State University; Theresa Chasar, Newell Brands; Mangaya Sivagnanam, Ingersoll Rand; Faisal Kaleem, Metropolitan State University
Tagged Divisions
Computing and Information Technology
Socket_Server (Bind_Port, B_Size): s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.bind(('', Bind_Port)) s.listen(5) conn, addr = s.accept() print "Connected with", addr Total = 0 while True: data = conn.recv(B_size) if not data: break print "Received Bytes: ", B_size Total = Total + B_size print "Total Bytes:", Total conn.close()#Run the Serverprint 'Prepare the server to be started'os.system ('pause')Socket_Server (Bind_port, B_size)print 'Connections closed'os.system ('pause')Client Side:#Script to establish a client side socket to test maximum bandwidth based on hardware resources#Using a file to send data for an
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Arshia Khan, University of Minnesota, Duluth
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
-fields-and-the-gender-gap-where- and information sciences: A design rationale analysis. are-the-women/#2715e4857a0b4aefb52f33a9 In System Sciences (HICSS), 2011 44th Hawaii International[3] Young, D.M., Rudman, L.A., Buettner, H.M. and McLean, Conference. IEEE, 1-10. M.C., 2013. The influence of female role models on [15] Parikh, P.P. and Sukhatme, S.P., 2004. Women engineers in women’s implicit science cognitions. Psychology of Women India. Economic and Political Weekly, 193-201. Quarterly, 37(3), 283-292. [16] Zingaro, D. 2015. Examining Interest and Grades in[4] Cheryan, S., Drury, B.J. and Vichayapai, M., 2012
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Vigyan Jackson Chandra, Eastern Kentucky University
Tagged Divisions
Computing and Information Technology
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Vijay Anand, University of Missouri, St. Louis; Dmytro Kudriashov, EPAM Systems
Tagged Divisions
Computing and Information Technology
] Cybersecurity Trends 2019: Privacy and Intrusion in the Global Village. Accessed: Oct. 21, 2019. [Online]. Available: https://www.eset.com/ca/trends-2019/[7] R. K. Konoth, E. Vineti, V. Moonsamy, M. Lindorfer, C. Kruegel, H. Bos, and G. Vigna, “MineSweeper: An In-depth Look into Drive-by, Cryptocurrency Mining and Its Defense,”In CCS ’18: 2018 ACM SIGSAC Conference on Computer & Communications Security, Toronto, ON, Canada, Oct. 2018, doi: 1145/3243734.3243858[8] S. Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. Accessed: Oct. 21, 2019. [Online]. Available: https://www.bitcoin.org/bitcoin.pdf[9] [9] ESET Virus Radar Threat Encyclopaedia. JS/CoinMiner. Accessed: Oct. 21, 2019. [Online]. Available: https
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Ida B. Ngambeki, Purdue University, West Lafayette; Marcus Rogers, Purdue University, West Lafayette; Sienna Jasmine Bates, Purdue University, West Lafayette; Megan Celeste Piper
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Computer Science Education, Larnaca, Cyprus, Jul. 2018, pp. 36–54, doi: 10.1145/3293881.3295778.[4] J. R. S. Blair, A. O. Hall, and E. Sobiesk, “Holistic cyber education,” Cyber Security Education. pp. 160–172, 2020, doi: 10.4324/9780367822576-10.[5] A. P. Henry, “Mastering the cyber security skills crisis,” Cyber Security Education. pp. 29–54, 2020, doi: 10.4324/9780367822576-2.[6] Global Cyber Security Capacity Centre University of Oxford, “Cybersecurity Capacity Maturity Model for Nations (CMM),” Oxford University, Mar. 2016. [Online]. Available: https://gcscc.ox.ac.uk/the-cmm.[7] P. A. Book, “All Hands on Deck: Ten Lessons from Early Adopters of Competency-Based Education,” Western Interstate Commission for Higher
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Umit Karabiyik, Sam Houston State University; Naciye Celebi; Faruk Yildiz, Sam Houston State University; James Holekamp, Sam Houston State University; Khaled Rabieh, Sam Houston State University
Tagged Divisions
Computing and Information Technology
controllers of the system, the type of data can be collected, andwhere the data can be collected. Data sources need to be identified when any type of attackperformed to the system. Needless to say, documentation of the actions taken during this phase iscritical and essential for a forensically sound investigation.Phase 3- Preservation, Prioritizing, and Collection: In this phase, the identified data is collectedfrom the known locations, and it is preserved and prioritized for the purpose of repeatability andpresentation. In this phase, it is also critical to collect volatile data as it might be destroyed easily.For instance, data can be collected from databases, computer workstation(s), PLC, etc.Phase 4- Examination: The purpose of this phase is the
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Kari L. Jordan Ph.D., The Carpentries; Marianne Corvellec, Institute for Globally Distributed Open Research and Education (IGDORE); Elizabeth D. Wickes, University of Illinois at Urbana-Champaign; Naupaka B. Zimmerman, University of San Francisco; Jonah M. Duckles, Software Carpentry; Tracy K. Teal, The Carpentries
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
/ploscompbiol/article?id=10.1371/journal.pcbi.1003285[9] J. M. Osborne‚ M. O. Bernabeu‚ M. Bruna‚ B. Calderhead‚ J. Cooper‚ N.Dalchau‚ S−J. Dunn‚ A. G. Fletcher‚ R. Freeman‚ D. Groen‚ B. Knapp‚ G. J.McInerny‚ G. R. Mirams‚ J. Pitt−Francis‚ B. Sengupta‚ D. W. Wright‚ C. A.Yates‚ D. J. Gavaghan‚ S. Emmott, and C. Deane, “Ten Simple Rules forEffective Computational Research,” PLoS Computational Biology,10(3):e1003506, 2014.[10] B. M. Duckles, “Value of Software Carpentry to Instructors Report,” Report to SoftwareCarpentry Foundation and Data Carpentry Foundation, 2016.[11] J. Dolin, P. Black, W. Harlen, and A. Tiberghien, “Exploring Relations Between Formativeand Summative Assessment,” in Transforming Assessment. Contributions from ScienceEducation
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
James K. Nelson Jr. P.E., Texas A&M University; Brent L. Donham, Texas A&M University-Commerce
Tagged Divisions
Computing and Information Technology
. [Online]. Available: https://universaltechnews.com/it-ot-cybersecurity-convergence-arc- viewpoints-blog/.[5] J. Manyika and et. al., "Unlocking the Potential of the Internet of Things," McKinsey Global Institute, McKinsey and Company, June 2015.[6] THECB, "Lower-Division Academic Course Guide Manual," Texas Higher Education Coordinating Board, Austin, TX, 2019.[7] Center for Academic Cyber Defense, "2019 Knowedge Units," [Online]. Available: http://www.iad.gov/NIETP/documents/Requirements/CAE- CD_2019_Knowledge_Units.pdf. [Accessed 2020].[8] ABET, "Criteria for Accrediting Computing Programs, Effective for Reviews During the 2020-2021 Accreditation Cycle," ABET, Inc., Baltimore, 2019.[9] J. K. Nelson, D. Davis, S. Smith and M
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Uma Kannan; Rajendran Swamidurai, Alabama State University
Tagged Divisions
Computing and Information Technology
-2020. 12. (ISC)² 2015 Global Information Security Workforce Study 13. The U.S. Bureau of Labor Statistics’s (BLS’s) Occupational Outlook Handbook, http://www.bls.gov 14. Preparing Cybersecurity Professionals to Make an Impact Today and in the Future, ISACA Headquarters, August 1, 2017, Agency Docket Number – 170627596-7596-01, Docket Number – 2017 - 14553 15. National Initiative for Cybersecurity Education, “Workshop on Cybersecurity Workforce Development: Notes from Panel Discussions,” August 2, 2017, https://www.nist.gov/sites/default/files/documents/2017/09/28/chicago_workshop_summary_notes.pdf. 16. Franklin S. Reeder and Katrina Timlin, Recruiting and Retaining Cybersecurity Ninjas (Washington
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Shahab Boumi, University of Central Florida; Adan Ernesto Vela, University of Central Florida
Tagged Divisions
Computing and Information Technology
level compared to the other twocategories. Such results can help university policymakers in the early identification of morevulnerable students and providing them with financial and academic supports to boost theirengagement with the university.References [1] Doug Shapiro, Afet Dundar, Faye Huie, Phoebe Khasiala Wakhungu, Ayesha Bhimdiwala, and Sean Eric Wilson. Completing college: A national view of student completion rates–fall 2012 cohort (signature report no. 16). National Student Clearinghouse, 2018. [2] Leila Zahedi, Stephanie J Lunn, S Pouyanfar, MS Ross, and MW Ohland. Leveraging machine learning techniques to analyze computing persistence in undergraduate programs. In 2020 ASEE Virtual Annual Conference Content Access
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Yuzhong Shen, Old Dominion University; Anthony W. Dean, Old Dominion University; Rafael Landaeta, Old Dominion University
Tagged Divisions
Computing and Information Technology
designed in the early 1980’s to reduceemissions by monitoring the performance of major engine component. The major component ofthe OBD is the Electronic Control Unit (ECU, Figure 3(a)), which receives inputs from varioussensors and control the actuators. OBDs provide digital trouble codes (DTCs) that can beaccessed via the Digital Link Connector (DLC, Figure 3(b)). (a) Components of OBD (b) OBD-II Port Figure 2. On-board Diagnostics (OBD)The latest version of OBD is OBD-II, which is available on all cars and light trucks built since1996. The OBD-II standard specifies the type of diagnostic connector and its pinout, theelectrical signaling protocols available, and the messaging
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University; Kimberlyn Gray, West Virginia University Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. This first year will serve as a pilot to gain insight and feedback into the survey andassignment.Below is the table containing KEEN framework category [3], KEEN related course outcomes[4], and the artifact(s) that will be used to assess each outcome. Appendix B provides theInstructor/Peer Video Rubric and Self-Reflection Rubric and appendix C contains the surveysgiven to the students. Category of KEEN KEEN Related Course Assessment Plan Related Course Outcome [4] Outcome [3] Related to Curiosity Take ownership of, and express Grade on Video interest in topic/expertise/project. Communication Present technical information Grade from rubric on these portions
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Benjamin Chambers
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
and lidar sensor. In 2015, Teslaintroduced its autonomous car. Google and Tesla take different approach in their design. Googleuses LIDAR (Light Detection and Ranging) and Tesla uses an array of cameras for computervision. The autonomous cars can be fully autonomous without a need for a driver or can bedriver-managed autopilot-enabled. Google SDC is an example of an autonomous car without adriver and Tesla Model S is an example of the second type.The area of autonomous vehicle design has been gaining a tremendous growth in recent years. Amajor aspect of this growth has been advanced technology, a rich set of sensors and cameras,advances in computational intelligence and machine vision. The autonomous vehicle hasattracted the researchers, the
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona
Tagged Divisions
Computing and Information Technology
, M., Shakib, J., A Taste of Java-Discrete and Fast Fourier Transforms, American Society for Engineering Education, AC 2011-451.2. Shakib, J., Muqri, M., Leveraging the Power of Java in the Enterprise, American Society for Engineering Education, AC 2010-1701.3. Mallat, S., Zhang, Z., Matching pursuit with time-frequency dictionaries, IEEE Trans. Signal Process., 41, 1993, 3397-3415.4. Rangayyan, R., Biomedical Signals analysis. A case-study approach, IEEE Press on Biomedical Signals. Calgary, Alberta, Canada, 20025. Feichtinger, H., Strohmer, T., Gabor Analysis and algorithms: Theory and applications, Editors. Birkhauser, Boston, 1998.6. Blinowska, K., Durka, P., The application of wavelet transform and matching pursuit to
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Laura Kay Dillon, Michigan State University; Michelle Slattery, Peak Research
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
recently, as Vice Chair of ACM SIGSOFT and General Chair of the 38th International Conference on Software Engineering. She has participated in many CRAW and ACM mentoring events; is a founding adviser of MSU Women in Computing, the MSU ACM-W Chapter; and co-led TechKobwa, a technology camp for secondary-school teachers and female students in Rwanda, for three summers. She was awarded the ACM SIGSOFT Distinguished Service Award in 2017.Ms. Michelle Slattery, Peak Research Michelle Slattery has more than 30 years’ experience as a professional evaluator working with diverse clients on complex project evaluations. Her business, Peak Research LLC, is celebrating 25 years of providing services to evaluate S-STEM, BPC, RED
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University
Tagged Divisions
Computing and Information Technology
market. https://jumpcloud.com/blog/comparing-three-directory-services/[2] M. Wahl, T. Howes, and S. Kille, "Lightweight Directory Access Protocol (v3)," IETF RFC 2251, Dec. 1997[3] CNSA at MTU. http://www.tech.mtu.edu/cnsa/[4] Microsoft Active Directory. http://www.microsoft.com/windowsserver2003/technologies/ directory/activedirectory/default.mspx[5] OpenLDAP. http://www.openldap.org/[6] VMWare. http://www.vmware.com[7] Canvas. http://www.canvas.com[8] VirtualBox. https://www.virtualbox.org/wiki/Downloads[9] Gerald Carter, “LDAP System Administration”. O'Reilly Media, Inc.
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Luis Eduardo Paredes, Guru Labs, L.C.; Jacob Morris, Utah Valley University
Tagged Divisions
Computing and Information Technology
presentation.Course Learning Outcomes: 1. Identify relevant topics from previous courses and then apply them to their project 2. Identify and specify design requirements from general problem descriptions 3. Communicate design ideas and information 4. Demonstrate creative thinking 5. Display information gathering skills 6. Demonstrate oral and written communication skillsTraits: Upon successful completion, students should have the following attitude(s)/traits:  Confidence in their ability to design.  Confidence in their ability to communicate technical information effectively.Our senior design course is structured as a collection of independent or group student projects.This capstone course is offered every semester