is an ASEE, INFORMS, and IEEE member. He is currently an Associate Editor of The 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IEEE-IROS 2019) . c American Society for Engineering Education, 2019 An Integrated Learning Approach Used in Computer Architecture Chaomin Luo, Ph.D. Department of Electrical and Computer Engineering Mississippi State University Mississippi State, MS 39762, USA email: Chaomin.Luo@ece.msstate.eduAbstractStudent-centered learning has been discovered as the most effective pedagogy for teaching
Paper ID #25133Design and Development of Cybersecurity Concentration Courses and Labo-ratory Experiences for Undergraduate StudentsDr. Nikunja Swain P.E., South Carolina State University Dr. Swain is currently a Professor at the South Carolina State University. Dr. Swain has 30+ years of experience as an engineer and educator. He has more than 60 publications in journals and conference proceedings, has procured research and development grants from the NSF, NASA, DOT, DOD, and DOE and reviewed a number of books on computer-related areas. He is also a reviewer for ACM Computing Reviews, IJAMT, CIT, ASEE, and other conferences
Paper ID #26981Science and Engineering Courses, Theory and Practice; An ExampleDr. S. ”Hossein” Mousavinezhad P.E., Idaho State University Dr. Mousavinezhad was the principal investigator of the National Science Foundation’s research grant, National Wireless Research Collaboration Symposium 2014; he has published a book (with Dr. Hu of University of North Dakota) on mobile computing in 2013. Professor Mousavinezhad is an active mem- ber of IEEE and ASEE having chaired sessions in national and regional conferences. He has been an ABET Program Evaluator for Electrical Engineering and Computer Engineering as well as
. His general expertise and interests include: IoT and Network Technologies, iOS application development, and Secure programming. He has recently published his first ASEE paper and presented at the ASEE NCS Section in March 2019 with his senior capstone team, SoT (Secure of Things). c American Society for Engineering Education, 2019 Pedagogical Assessment of Secure Coding in Student ProgramsAbstractStudents in introductory Computer Science (CS) courses are required to submit severalprogramming assignments and/or projects. The submitted programs are largely assessed on theircorrectness to the given problem, and not against secure software coding practices. In ourexperience, student programs
University in 1996 and Ph.D. in Computer Science from Clemson University in 2003. His research interests are in the areas of software testing, software metrics, model-driven software development, domain-specific modeling languages, and computer science education. He is currently an associate professor in the School of Computing and In- formation Sciences at Florida International University. He is a member of the ACM (SIGSOFT, SIGCSE, and SIGAPP); IEEE Computer Society; and a member of the Association for Software Testing (AST). c American Society for Engineering Education, 2019 Students’ Perceptions of the Implementation of a Cyberlearning
devel- oping pedagogical methods and materials to enhance engineering education. Her most recent educational c American Society for Engineering Education, 2019 Paper ID #27262 research includes the collaboration with Tennessee State University and local high schools to infuse cyber- infrastructure learning experience into the pre-engineering and technology-based classrooms, the collab- oration with community colleges to develop interactive games in empowering students with engineering literacy and problem-solving, the integration of system-on-chip concepts across two year Engineering Science
the Diploma in EE from the National Technical University in Athens, his MS degree and Ph.D. degree in EE from the University of Connecticut, Storrs, CT, in 1981, 1983 and 1986, respectively. He is currently a Professor in the Department of EECS at the University of Central Florida in Orlando, FL. From September 2011 to June 2012 he served as the Interim Assistant Vice President of Research at the Office of Research and Commercialization. Since July 2013 he is serving as the Dean of the College of Engineering and Computer Science. c American Society for Engineering Education, 2019 Paper ID #27760
Paper ID #24915Creating Guided Study Exercises for a Flipped Database CourseDr. Karen C. Davis, Miami University Karen C. Davis is an Associate Professor in the Department of Computer Science and Software Engineer- ing at Miami University. Her research interests include database design, query processing and optimiza- tion, data warehousing, and computing education. She has published more than 50 papers, most of which are co-authored with her students. She has advised over 100 senior design project students and more than 40 MS/PhD theses/projects in the area of database systems. She was awarded the ASEE Sharon Keillor
. c American Society for Engineering Education, 2019 Wireless Sensor Networks in Smart and Secure HomesAbstractRecent advances in wireless networks and electronics have led to the emergence of WirelessSensor networks (WSNs). These networks consist of small battery–powered motors with limitedcomputation and radio communication capabilities. Each sensor in a sensor network consists ofthree subsystems: the sensor subsystem which senses the environment, the processing subsystemwhich performs local computations on the sensed data, and the communication subsystem whichis responsible for message exchanges with neighboring sensors. WSNs comprise tiny wirelesscomputers that sense, process, and communicate environmental stimuli, including
. c American Society for Engineering Education, 2019 Automatic Creation of Fine-Grained Vulnerable Windows System for Penetration Testing Education Arati Banerjee, Cliff Zou and Damla Turgut Department of Computer Science University of Central FloridaAbstractIn the face of the increasing needs of cybersecurity professionals from US public and privatesectors, many universities have created various cybersecurity education programs. Penetrationtesting, as a critical component in cybersecurity training, often requires setting up virtualmachines (VM) with various vulnerabilities. However, it is usually time-consuming andtechnically difficult to fine
universities nationwide, specifically in the areas of software engineering and cybersecurity pedagogy. Dr. Buckley is a member of the Upsilon Pi Epsilon, Golden Key International and the American Society for Engineering Education (ASEE).Dr. Geoff Potvin, Florida International UniversityDr. Mandayam Thirunarayanan, Florida International University Mandayam Osuri Thirunarayanan is an associate professor in the School of Education and Human De- velopment (SEHD), in the College of Arts, Sciences, and Education (CASE) at Florida International Uni- versity, in Miami, Florida. He teaches courses in learning technologies at the undergraduate, masters and doctoral levels. He also supervises doctoral dissertations. His research interests
for collaborating on teaching, scholarly and service projects, especially those aimed at improving students’ critical/creative and communication skills. c American Society for Engineering Education, 2019 Boardnotes 2.0 in Computer Networking: Organizing and Representing Meaningful Technical Information Graphically for Improving Learning CompetenciesAbstractThe field of computer information technologies in general, and more specifically that of networkswitching and routing, is filled with abstractions, abbreviations, and acronyms, along with anaccompanying assortment of implementation techniques frequently requiring customization.Bridging the divide between theory and
-WIE. She is also on the leadership team of the Kentucky Girls STEM collaborative network. c American Society for Engineering Education, 2019 USING A DATA SCIENCE PIPELINE FOR COURSE DATA: A CASE STUDY ANALYZING HETEROGENEOUS STUDENT DATA IN TWO FLIPPED CLASSESAbstractThis study presents a data science methodology to integrate and explore disparate student datafrom an engineering-mathematics course. Our methodology is based on exploratory data miningand visualization for analyzing and visualizing raw student data from multiple data sources. Theexploratory analysis serves two purposes, 1) it supports the instructor's desire to gain insightsinto the implementation of a flipped
the American Society for Engineering Education (ASEE).Dr. Khalil A. Said, Davenport University Adjunct Faculty at Davenport UniversityGhaythah Abdullah Alqarna c American Society for Engineering Education, 2019 Effectiveness of ITIL: Decision makers’ perspectives Abstract: Information Technology (IT) is a fast-growing field interrelating manydisciplines to fulfill business computing and transactional processing needs. Informationtechnology encompasses hardware, software, and network communications software andhardware to provide high quality services and products. The advancement of networktelecommunications and related technologies has served as a catalyst to many organizations