Asee peer logo
Displaying results 91 - 120 of 154 in total
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Laura Kay Dillon, Michigan State University; Michelle Slattery, Peak Research
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Education, 2018 A Flipped Active-Learning Class to Support Diverse Students in a Large Introduction to Programming Class1. IntroductionTen years of surging interest in computer science has produced a nearly 300% increase incomputer science (CS) majors at Ph.D. granting institutions, as well as significant increase indemand for computing courses by non-majors [1]. While this surge may eventually helpameliorate pressing workforce needs for computing professionals [2], it is placing inordinatestress on resources and faculty of most CS departments. Measures taken to reduce this stress areoften at odds with goals to increase the numbers of CS graduates and to equip graduates of othermajors with the computational skills
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Justin Daniel Josey, Robert Morris University; Sushil Acharya, Robert Morris University
Tagged Divisions
Computing and Information Technology
expressions correspond to emotions have applications in avariety of fields, most important being psychology. Other uses are in casinos, dating sites, lawenforcement, social media, credit card verification, and even class attendance. Facial ExpressionRecognition is used in psychology to reveal a person’s true emotion at the given time [1, 2].Charles Darwin was the first to suggest that facial expressions were universal, meaning thatfacial expressions are biologically innate and have evolved with us as part of evolution [3].Psychology researchers have conducted multiple studies that have supported Darwin’s idea aboutfacial expressions [4, 5, 6]. Two prominent psychologists, Ekman and Friesen, conducted the mostfamous studies which are now known as the
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Vuk Marojevic, Virginia Tech; Antoni Gelonch-Bosch, Universitat Politècnica de Catalunya; Jeffrey Reed, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
environment (ALOE) to provide a practical learning environmentthat facilitates developing many of the needed technical and soft skills without the inherentdifficulty and cost associated with radio frequency components and regulation. We define sixlearning stages that assimilate the standardization process and identify key learning objectivesfor each. We discuss our experiences when employing the proposed methodology at BarcelonaTech in Spain, compare the approach with an equivalent class at Virginia Tech in the US andmake the following observations: (1) The complexity of standards need to be abstracted andpresented in a form suitable for a given class. (2) Educating about cellular communicationsstandards is most effective when students are immersed
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Farshid Marbouti, San Jose State University; Valerie A. Carr, San Jose State University; Belle Wei, San Jose State University; Morris E. Jones Jr., San Jose State University; Amy Strage
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
subjects. These results show that ACBSS, aninterdisciplinary computing education program, offers a promising model in providingcomputing education to more diverse students for the 21st-century digital workplace.1. IntroductionAs the technology-based economy grows, so does its demand for technology professionals. TheU.S. Bureau of Labor Statistics projects a growth of 1.1 million American jobs in computing andinformation technology by 2024—with only 450,000 graduates available to fill them [1]. Inaddition to technology professionals, more technology-capable workers are needed in theincreasingly digitized workplace [1]. In all, the gap between the demand and supply oftechnology-educated workers slows economic growth while raising income inequality
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andrew R. Schmitt, Metropolitan State University; Theresa Chasar, Newell Brands; Mangaya Sivagnanam, Ingersoll Rand; Faisal Kaleem, Metropolitan State University
Tagged Divisions
Computing and Information Technology
areinternet connected [1]; each with an IP address and the ability to transmit data. These deviceshave little or no built-in security, and users often fail to change default passwords beforeconnecting them to their network; making them easy targets for hackers. By comprising theseconnected devices and harnessing them into a botnet, IoT has intensified the threat ofconventional distributed denial of service (DDoS) attacks.In September 2016, large IoT botnet attacks started drawing attention. What started as a rarelyseen or largely theoretical attack become front page news. Three major sites were hit in a month;disrupting services and affecting users worldwide. Those sites include the French Internet serviceprovider OVH (1.1 Tbps attack), DNS service
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Dale Drummond, East Carolina University; Philip J. Lunsford II, East Carolina University; Ciprian Popoviciu, Nephos6, Inc.
Tagged Divisions
Computing and Information Technology
alsoplaced at the school district’s Central Office (CO) and Internet Service Provider (ISP). Identicalmeasurements are recorded from each agent at a polling interval ranging from 10 minutes to 1-hour dependent on the importance of the service being monitored. Higher importance servicesare monitored more frequently than lower importance services. Data analysis is applied toestablish a performance baseline for each service, at each agent location, over the same timewindow.The data collected and presented enables the limited IT staff of the school district to identifyperformance issues promptly and automatically narrow down the fault domain. Themethodologies employed and shared in this study will allow for automatic and proactivenotification of the
Conference Session
Crafting the Future of Computing Education in CC2020
Collection
2018 ASEE Annual Conference & Exposition
Authors
Stephen T Frezza, Gannon University; Arnold Neville Pears, Uppsala University; Marisa Exter, Purdue University, West Lafayette (College of Engineering); Barry M. Lunt, Brigham Young University
Tagged Divisions
Computing and Information Technology, Software Engineering Division
’sandbeyond.ThisworkshopprovidesanoverviewoftheCC2005andrelatedreportsandlinksthemtothetransitionintotheCC2020project.ItalsoprovidesparticipantswithauniqueopportunitytocollaboratewithmembersoftheCC2020taskforceandcontributetothedevelopmentoftheresourcestheprojectwilldeliver.TheworkshopauthorsandparticipantswillengageinactivitiestohelpdefinehowComputingisdefinedwithintheprojectanddiscusshowtoextenditsinfluenceinglobalundergraduatecomputingeducationforthefuture.Theauthorsanticipatefullaudienceinvolvementandparticipationinformulatingthisvision.Keywords—Computingeducation,CC2020,CC2005,futureComputingeducationI.INTRODUCTIONIn2015,theAssociationforComputingMachinery(ACM)begantoexploreavenuesthroughwhichtoupdatethebroadlyinfluential:ComputingCurricula2005document,taggedasCC2005[1].ACM,theAssociationforInformationSystems(AIS),andtheIEEEComputerSociety(IEEE-CS)weresponsorsofthe2005document.In2016,ACMdecidedtoproceedwiththenewproject.Itestablishedanexploratorycommitteetoascertaintheneedforanewreport.ACMandIEEE-CSbecametheprincipalsponsorsoftheCC2020project.Otherprofessionalorganizationshavejoinedintheeffortwithadditionalsponsorship;theseincludetheAssociationforInformationSystems(AIS),andAssociationforInformationTechnologyProfessionals,EducationSpecialInterestGroup(AITP/EDSIG
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
successful.Keywords:Industry Demand, Data Science Talent Gap, Undergraduate Curriculum Development, Data Science, ComputerScience Curricula, Interdisciplinary Programs1 IntroductionAn exponential growth in information and computing technologies’ capabilities in terms ofstoring, retrieving and processing large amounts of various types of data has led to an increasingdemand for experts skilled at working with data [1, 2]. Skilled Data Scientists and Data Analystsare in high demand, from Silicon Valley to Wall Street to large retail chains to health careorganizations and across many other industries and sectors. In particular, it has been observedthat the demand for data science/analytics talent, unlike say 10-15 years ago, is no longer limitedto high-tech giants [2
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona; Srikanth Venkatesan, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
survey. Ananalysis of the data collected from surveying the literature is conducted and the results are testedfor significance. Finally, recommendations based on the analysis are summarized to aid otherinterested universities in developing new programs.1. IntroductionCybersecurity is a major concern in today's world. According to Juniper research, the cost of databreaches in 2019 is expected to be $2.1 trillion globally showing an increase of almost four timesthe cost of breaches in 2015 [1]. This tremendous increase in cybercrimes requires an adequatepreparation for future students to acquire the skills needed to deal with these future risks.The importance of cybersecurity comprises on the information secured. Its’ well known thatinformation is
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andreas Febrian, Utah State University; Oenardi Lawanto, Utah State University; Kamyn Peterson-Rucker; Alia Melvin; Shane E. Guymon
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
) into theircurriculum. Although Wing describes CT as a problem-solving approach that utilizesfundamental computing concepts, which is applicable not only for scientists but everyone, mostof the computational thinking instructional approaches are related to computer programming.Unfortunately, it is also unclear whether people use CT when solving non-programmingproblems. This study aims to answer two research questions: (1) In what ways do students usecomputational thinking skills when solving non-programming problems if any?; and (2) Ifstudents use CT when solving non-programming problems, in what ways do their approachesdiffer from computer science students? We conducted a qualitative multiple within-site casestudy research with three units of
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Raja S. Kushalnagar, Gallaudet University; Gary W. Behm, Rochester Institute of Technology; Kevin T. Wolfe; Peter Yeung; Becca Dingman; Shareef Sayel Ali, Center on Access Technology ; Abraham Glasser, Rochester Institute of Technology; Claire Elizabeth Ryan
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
evaluation of a Real-Time Text Display with Speaker-Identification, whichdisplays the location of a speaker in a group (RTTD-ID). RTTD-ID aims to reduce frustration inidentifying and following an active speaker when there are multiple speakers, e.g., in a lab. It hasthree different display schemes to identify the location of the active speaker, which helps deafstudents in viewing both the speaker’s words and the speaker’s expression and actions.We evaluated three RTTD speaker identification methods: 1) traditional: captions stay in oneplace and viewers search for the speaker, 2) pointer: captions stay in one place, and a pointer tothe speaker is displayed, and 3) pop-up: captions “pop-up” next to the speaker. We gathered bothquantitative and
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Kari L. Jordan Ph.D., The Carpentries; Marianne Corvellec, Institute for Globally Distributed Open Research and Education (IGDORE); Elizabeth D. Wickes, University of Illinois at Urbana-Champaign; Naupaka B. Zimmerman, University of San Francisco; Jonah M. Duckles, Software Carpentry; Tracy K. Teal, The Carpentries
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
usage, and sixty-fivepercent of respondents have gained confidence in working with data and open source tools as aresult of completing the workshop. The long-term assessment data showed a decline in thepercentage of respondents that 'have not been using these tools' (-11.1%), and an increase in thepercentage of those who now use the tools on a daily basis (+14.5%).Keywords: Assessment, data science, short coursesIntroduction: State of Data Science Workforce NeedsGlobally, data science talent is in high demand. In their widely cited report on big data,McKinsey Global Institute (MGI) estimated that, by 2018, in the United States, the shortfall indata science workforce would be 60% of its supply [1]. Although the term ‘data science’ was notin use
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University
Tagged Divisions
Computing and Information Technology
services. Course topics include designing, implementing, administrating and troubleshooting variousdirectory service products in an enterprise environment, as well as application integration using directory services, i.e., email and single-sign-on. Virtual machines are used to set up lab test bed. The lab assignments and semester project are designed to further students’ knowledge ofdirectory services and gain “hands-on” experience. An assessment of the course is also discussed.1. INTRODUCTION A directory service is a repository that stores and organizes information about users and network resources. The information can beused by other applications and services to manage users' access to resources. Directories are highly optimized for reading and
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
undergraduates) tend to fall into two categories: i) theoretical CS courses are "all math" requiring proofs andrigorous formal reasoning that many CS and other engineering students aren't (yet) comfortable with; and ii) "why dowe need all this theory anyway" if our career goal is to become software engineers, develop the next cool mobile app,and similar. Yet, most research universities, as well as quite a few non-research colleges, require at least 1-2 semestersof core undergraduate coursework in theoretical or foundational CS.We summarize some interesting lessons learned from teaching theoretical CS to mostly undergraduate upperclassmen(as well as a few non-traditional students) at two prominent public research universities in the US Pacific Northwest
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mariangely Iglesias Pena, Iowa State University; Stephen B. Gilbert, Iowa State University; Jamie Payton, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
directorate and significantly easethe process of engaging future scientists via REU sites.IntroductionThe CISE directorate of NSF has funded Research Experience for Undergraduates (REU) sitesfor over 30 years, offering hundreds of faculty principal investigators (PIs) the experience ofmentoring undergraduates through research projects by running an REU site. Starting in 2002,CISE has organized REU PI meetings to share best practices among PIs to raise the quality ofimplementation across all sites. According to Matzen and Alrifai [1], however, a 2008 SIGCSEsurvey showed notable differences in PIs’ objectives for and conceptualization of undergraduateresearch. Thus, while the structure of successful REU sites can vary, there is still a need
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Karen C. Davis, Miami University
Tagged Divisions
Computing and Information Technology
?The focus of this paper is on experiences flipping an introductory database class. In particular,what are the best practices for holding students accountable for preparing for class? The authorhas employed online reading quizzes as well as guided study assignments. Examples ofassignments as well as multiple measures of student perceptions of learning are presented.1. Active LearningActive learning is constructivist rather than exposition-centered learning. Students areencouraged and supported in a learning process where they are directly engaged with and takeresponsibility for their own learning. The merits of active learning (as opposed to passivelylistening to a lecture) are well-documented. A meta-study by Freeman et al. (2014) examined225
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Kailee Parkinson, Utah Valley University; Elham Vaziripour, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
[5] discusses how Data Mining is not just for computer science and should be offered inthe field of statistics. Romero and Ventura [2] studied an interdisciplinary field of educationalData Mining (EDM) and reviewed milestones, applications, tools and future insights within thisfield. Anderson et. al. proposed a four-year undergraduate program in predictive analytics,machine learning, and Data Mining implemented at the College of Charleston [4]. However, theydid not describe the details for any of these courses. Sanati-Mehrizy et. al., studied differentapproaches that have been taken by different institutions for integration of Data Mining conceptsinto undergraduate computer science program [1]. Their work motivated us to conduct our studyon
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Naeem Seliya, Ohio Northern University; Heath Joseph LeBlanc, Ohio Northern University; J. Blake Hylton, Ohio Northern University; Ziad Youssfi, Ohio Northern University; Matthew Schweinefuss
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
curiosity in exploring a topic supports learning that knowledge [1], building upon whatis taught in their academic program. Curiosity supports lifelong learning, one of the mostdesirable outcomes of higher education, by its role as an intrinsic reward [2]. Curiosity has alsobeen linked with workplace learning and job performance [3]. Given the short-term and long-term benefits curiosity can have on self-directed learning and job performance, it is important tobe able to identify whether students are exhibiting curiosity in the assignments that are submittedfor formative feedback.In recent years’ text mining has seen increasing focus on the investigation of sentiment [4],behavior analytics [5], linguistic understanding [6] improving product
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Nikunja Swain P.E., South Carolina State University; Biswajit Biswal, South Carolina State University
Tagged Divisions
Computing and Information Technology
. Thefindings presented in this paper may be used by interested parties in cybersecurity curriculum and coursedevelopment. IntroductionInformation and Communication Technologies (ICT) have become increasingly important for US. The2005 U.S. President's Information Technology Advisory Committee (PITAC) report Cybersecurity: ACrisis of Prioritization included statistics on attacks and vulnerabilities. Data from this report shows thatthe total number of attacks – including viruses, worms, cyber fraud, and insider attacks in corporations –is rising by over 20 percent annually, with many types of attacks doubling in number [1]. In Novemberand December 2015, ISACA and RSA Conference conducted a global survey of
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Luis Eduardo Paredes, Guru Labs, L.C.; Jacob Morris, Utah Valley University
Tagged Divisions
Computing and Information Technology
presentation.Course Learning Outcomes: 1. Identify relevant topics from previous courses and then apply them to their project 2. Identify and specify design requirements from general problem descriptions 3. Communicate design ideas and information 4. Demonstrate creative thinking 5. Display information gathering skills 6. Demonstrate oral and written communication skillsTraits: Upon successful completion, students should have the following attitude(s)/traits:  Confidence in their ability to design.  Confidence in their ability to communicate technical information effectively.Our senior design course is structured as a collection of independent or group student projects.This capstone course is offered every semester
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State University; Xiangyan Zeng, Fort Valley State University; Chunhua Dong, Fort Valley State University
Tagged Divisions
Computing and Information Technology
of student feedbackregarding the level of their interest in programming before and after robotic activities, thechallenges of programming a robot, and their overall rating of integrating robotic activities inprogramming classes are presented and discussed.IntroductionIntroductory computer programming is a core subject in the curriculum of computer sciencemajor. The subject is frequently taught in three different courses; namely, CS 0, CS 1, and CS 2.The topics covered in CS 0 are often related to various fundamental concepts in computing andcomputer algorithms. Many computer science programs place a particular emphasis on computeralgorithm in CS 0 to familiarize students with programming logic. In CS 1, students learn towrite computer
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mohsen Taheri, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University; Deepa Chari, Florida International University; Zahra Taheri
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
departments of computer science and engineering. Her interests focus on broadening participation in computer science and engineering through the exploration of: 1) race, gender, and identity; 2) discipline-based education research (with a focus on computer science and computer engineering courses) in order to inform pedagogical practices that garner interest and retain women and minorities in computer-related engineering fields.Prof. Zahra Hazari, Florida International University Zahra Hazari is an Associate Professor in the Department of Teaching and Learning and the STEM Trans- formation Institute as well as an affiliate faculty member in the Department of Physics. Dr. Hazari’s research focuses on reforming physics
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Rosa Maria Castro Fernandes Vasconcelos, University of Minho; Victor F. A. Barros, University of Minho; Luis Alfredo Martins Amaral P.E., University of Minho; Emilia Rodrigues Araújo, University of Minho; Isabel Ramos, University of Minho
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Information systems.IntroductionSeveral studies have pointed out the need to foster a diagnosis and an intervention concerninggender equality in academic contexts (1-14). Studies carried out by Amâncio (9-10) demonstratedthe existence of gender patterns in access and mobility processes to which are linked gender biasesand stereotypes that place women on the "margins" of knowledge production. Recent studiesdeveloped in Portugal (15) describe how women and men are socially perceived according toessentialist dichotomous principles, which favour the invisibility and devaluation of women.Legislation on the promotion of gender equality in educational institutions in Portugal is relativelyrecent compared to other European countries and it is the result of a
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Janis P. Raje
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
chance” at education. UVU has a high number of non-traditional students (age 25 or older – 34%), students with spouses (45%) and/or children underage 12 (20%) [1]. It also has the largest percentage of low-income (48%) and first-generation(38%) students of any of the universities in the state. These factors affect the overall graduationrate, which is low at 33% (nationally standardized IPEDS rate for completions within 150% oftime; UVU IR 2019) [1]. UVU’s students live at home or in off-campus housing, which makes itvery difficult to organize activities for student programs. Many students do not have time tospend much time outside of class on campus, leading some to feel little connection with otherstudents.New Engineering ProgramsTo meet one of
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jingshan Wu, Zhejiang University; Yujie Wang, Zhejiang University; Hanbing Kong, Zhejiang University; Ling Zhu, Zhejiang University
Tagged Divisions
Computing and Information Technology
Framework of CT for Big E (CT-ENG)Computation thinking is a broad term that encompasses a set of concepts, techniquesand skills. In this section, the study will deconstruct and define CT in the context of“engineering with Big E” (CT-ENG) as follows: We firstly draw on multiply materialsincluding standard documents, reports, and other scholarly literature to identify thecore elements of CT-ENG. We then conduct face to face semi-structured in-depthinterviews with 19 professionals and 5 human resources executives from 11enterprises and institutes. After two rounds of revisions, we formulate a frameworkfor CT-ENG based on these four elements (See Fig.1): Digital Literacy: Understand the basic functions and terminology related to computer hardware
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Chafic Bousaba, Guilford College
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
outside securityrisks, how to control internet access to and from their internal networks, and how to allow publicaccess to resources the company provides while preventing the public from accessing the internalnetworks [1]. To accomplish this, network architects usually divide the network into zones. Theuntrusted zone is for all incoming internet traffic which is untrusted by default, just before it goesthrough the network’s firewall. The trusted zone is for any traffic that is on the internal network.Any resources that the business provides for public consumption, like HTTP requests to thecompany’s webserver, does not need to be on the internal network for security purposes. In orderto accommodate that traffic a demilitarized zone is set up with
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Arati Banerjee, University of Central Florida; Damla Turgut, University of Central Florida; Cliff C Zou, University of Central Florida
Tagged Divisions
Computing and Information Technology
tune vulnerabilities in VM systems. In this paper, we present anautomatic security patch removal tool that can fine tune various Windows VM systems to preciselevels of vulnerabilities, and easily employed by students and educators alike. This tool cancreate virtual machines that simulate different security states in the Windows operating systemtimeline and gives a more realistic view of the ever-changing state of cybersecurity to thestudents pursuing an education in the field.1. IntroductionIn the current Internet-connected world, most companies, government agencies, and ordinarypeople heavily rely on the cyber world for information and data management, processing, andexchange. Information leakage and data breaches become increasingly damaging
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Vigyan Jackson Chandra, Eastern Kentucky University
Tagged Divisions
Computing and Information Technology
and textually on class-laboratory worksheetsincreases engagement with the content. In addition, ways of memorizing the content may beintroduced visually, along with strategies that aid the long-term recall process.Keywords:boardnotes, diagrams, networking, switching, routing, electronics, systems, visual learning,illustrations, notesIntroductionIn the ever-increasing data-centric environments we live and work in, understanding andexpressing ideas visually as well as verbally is part of a critical skillset. Providing students withstructured opportunities for class and laboratory activities to sharpen these skills will allow themto better navigate their way in the workforce.According to [1] experts notice patterns and features in information
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mark Dempsey, Collin County Community College ; Ann F Beheler, Collin County Community College
Tagged Divisions
Computing and Information Technology
experience at Rockwell, Raytheon and Novell; and she has led her own consulting firm, created and taught in one of the first networking degree programs in Texas, and previously managed IT- related divisions and grants ranging $1-$20 million in community colleges in Texas and California. Prior to her current position, she was Vice President of Academic Affairs for Porterville College, responsible for all instruction at the college, and prior that she was a Dean at both Orange Coast College in California and at Collin College. Among other things, Ann is known for effectively bringing together business and industry using a stream- lined process to identify with them the knowledge, skills, and abilities (KSAs) they predict
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Reza Kamali, Utah Valley University; Matthew Meyers, Utah Valley University; Nima Kamali-Sarvestani, Utah Valley University
Tagged Divisions
Computing and Information Technology
safe, hazardfree environment where students can make mistakes without losing much time or costing theuniversity any money. This paper details the VR simulation Utah Valley University (UVU) iscreating in order to allow students to simulate the etching process. The further goals of this paperare to explain the rationale behind the creation of the simulation and its potential in the studentlearning of nanotechnology.IntroductionThe National Nanotechnology Initiative (NNI) defines nanotechnology as “ ...the understandingand control of matter at the nanoscale, at dimensions between approximately 1 and 100nanometers” [1]. As nanotechnology grew it became necessary to manipulate at the nanoscalevia multiple methods, one such method being