Paper ID #29586Use of Internet of Things for Remote Laboratory SettingsProf. Abul K. M. Azad, Northern Illinois University Abul K. M. Azad is a Professor and Associate Dean with the College of Engineering and Engineering at Northern Illinois University, US. He has been in academics 30+ years, and his research interests include remote laboratories, mechatronic systems, mobile robotics, and educational research. In these areas, Dr. Azad has over 130 refereed journal and conference papers as well as 5 edited books. So far, he has attracted around $2.6M of research and development grants from various national and international
detection (Drones), IOT, and big data analysis. He has more than 10 technical papers published in conferences and journals. He is also a member of IEEE. c American Society for Engineering Education, 2019 Design and Development of Cybersecurity Concentration Courses and Laboratory Experiences for Undergraduate Students AbstractInformation and Communication Technologies (ICT) have become increasingly important for UScitizens, who are becoming dependent on the use of information networks and services in their dailylives. Yet, while uptake of new technology among citizens is high, a large portion of the populationremains unaware of their exposure to
Paper ID #22725Work in Progress: Designing Laboratory Work for a Novel Embedded AICourseDr. Mehmet Ergezer, Wentworth Institute of Technology Mehmet Ergezer (S’06) received the B.S. and M.S. degrees in electrical and computer engineering from Youngstown State University, Youngstown, OH, USA, in 2003 and 2006, respectively. He received the D.Eng. degree in artificial intelligence from the Department of Electrical and Computer Engineering, Cleveland State University, Cleveland, OH, USA, in May 2014. From 2003 to 2005, following his internship with U.S. Steel, he was a Graduate Assistant with Youngstown State University. In
technical program committee (TPC) member of high quality international conferences in Digital Forensics and Security. c American Society for Engineering Education, 2020 Internet of Things Forensics in Smart Homes: Design, Implementation and Analysis of Smart Home Laboratory Shinelle Hutchinson, Yung Han Yoon, Neesha Shantaram, and Umit Karabiyik {hutchi50,yoon127,nshantar,umit}@purdue.edu Department of Computer and Information Technology Purdue UniversityAbstractThe Internet of Things (IoT) has skyrocketed to the forefront of everyone’s lives, whether theyknow it or not. IoT devices
of Technology An undergraduate of Beijing University of TechnologyMiss YaNa Guo, Faculty of InformationTechnology,Beijing University of Technology I am a senior student of Beijing University of Technology,majoring in Computer Science and Technology.Prof. Xiwei Liu, Qingdao Academy of Intelligent Industries; Institute of Automation, Chinese Academy ofSciences Xiwei Liu is an associate professor of engineering at the State Key Laboratory of Management and Control for Complex Systems, Institute of Automation, Chinese Academy of Sciences, and an executive deputy director of Institute of Smart Education Systems, Qingdao Academy of Intelligent Industries. He received the Ph.D. degree at Nara Institute of Science and
statistics, research methodology in nutritional science, and research methods for healthcare education. American c Society for Engineering Education, 2021 A Journey from End Systems to Backbone Routers - A Virtual Lab Environment for Online Computer Networking Courses Zhaohong Wang∗ Jing Guo†AbstractCarrying out purely online laboratory for the computer networking course is challenging in a fewaspects. Students lack tangible interaction with the physical user interface of physical networkingequipment, and for the instructor, setting up a virtual environment precisely matching the realphysical lab is
Paper ID #22542Virtual Reality Implementation of a Scanning Electron Microscope in Nan-otechnology EducationLandon A. Braden Landon is an electrical engineering student at Utah Valley University. As a member of UVU’s nan- otechnology team, he writes lesson material and participates in experiments involving nanotechnology fabrication. He is also an amateur inventor.Scott Alexander Kaiser, Utah Valley University Scott is an undergraduate physics student at Utah Valley University. He is working as a research student to develop laboratory experiments for an associate level nanotechnology program.Dr. Reza Kamali-Sarvestani, Utah
this paper are available forother schools that would like to use and/or modify for their own purposes.[1]IntroductionAdministrative tasks like scheduling require substantial work doing iterations of menialtabulations, analysis, and revision. Most colleges and universities have software that helps withthese tasks, but it is not well suited to a technical curriculum with extensive prerequisites,laboratory/equipment/software constraints, and faculty availability. The result is a lot of manualprocessing of spreadsheets and timetables.At Western Carolina University (WCU) there are five residential undergraduate programs thatshare a number of courses. In addition, there are two undergraduate programs that are offeredoff-campus and a residential and
and textually on class-laboratory worksheetsincreases engagement with the content. In addition, ways of memorizing the content may beintroduced visually, along with strategies that aid the long-term recall process.Keywords:boardnotes, diagrams, networking, switching, routing, electronics, systems, visual learning,illustrations, notesIntroductionIn the ever-increasing data-centric environments we live and work in, understanding andexpressing ideas visually as well as verbally is part of a critical skillset. Providing students withstructured opportunities for class and laboratory activities to sharpen these skills will allow themto better navigate their way in the workforce.According to [1] experts notice patterns and features in information
college, we partnered with Google to offer our Information andComputer Technology students additional experience with Google Cloud Platform (GCP), acommercial, cloud-based (public cloud) platform. The cloud-based lab environments areaccessible to students anytime and anywhere over the Internet. Our purpose is to capitalize oncloud computing technologies to enhance the learning experiences for both on-campus, face-to-face students and online, distance education students.Four new laboratory modules are developed. Content such as cloud security is added to reflectthe new development in the information technology field. Students can conduct up-to-date labexercises in virtual environments hosted remotely on the cloud. This approach is different
master’s degree in Electrical Engineering from Stanford University, and a doctorate in Educational Administration from Texas A&M University- Commerce. In addition to his higher education experience, he has more than twelve years of industry experience with Sandia National Laboratories and E Systems (now L3/Harris). c American Society for Engineering Education, 2020 Preparing Students for Careers in the Emerging Field of CybersecurityAbstractCybersecurity is an emerging field with significant implications as the use of interconnecteddevices increases. Each device represents a potential entry point for individuals with maliciousintentions. A direct result of the growth of the number of Internet
programmable data plane switches.Mr. Jose Gomez, University of South Carolina Jose Gomez is a Computer Engineering PhD student at the University of South Carolina in the United States of America. For the last three years, he worked as a researcher and teaching assistant in the School of Engineering at the Catholic University in Asuncion.Antonio Mangino, The University of Texas at San Antonio Antonio Mangino is currently pursuing a Master’s degree in Information Systems and Cyber Security at The University of Texas at San Antonio. He received his B.S. in Computer Science from Florida Atlantic University (FAU) in 2019. As a member of the Cyber Threat Intelligence Laboratory at Florida Atlantic
University. During the course of our studies, several students(graduate and undergraduate) worked under the supervision of faculty members to understand theforensic aspects of real world attacks on SCADA hardware as well as the network used by thesystem. This new laboratory is intended to be used for Computer Science, Digital and CyberForensic Engineering Technology, and Engineering Technology programs at our university. Withthe availability of this laboratory we have a realistic SCADA/ICS system which can be used tostudy real-life experiments such as penetration assessment and testing, vulnerability assessmentand testing, and the SCADA forensics research. In addition to aforementioned research activities,the laboratory will also serve to develop
transition from thetraditional physical laboratory to the online virtual laboratory. Before the pandemic, we alreadygradually adopted more and more virtual labs. Students log in to a virtual environment,consisting of one or more virtual machines, to perform hands-on exercises. They do not need togo to an on-campus lab at a fixed time. Students can do the virtual labs at any place and at anytime. Virtualization makes it possible for students to do some labs which are otherwiseunavailable in a traditional environment. In many courses with a lab component, F2F sectionsand DE sections shared the same virtual lab environment already, making the transition fromface-to-face to online easier.As described in papers previously [3]-[4], different virtual lab
the role of these centers in promoting a cybersecurity culture and advancing thecybersecurity education process in these universities. The output of the survey shows that thefollowing cybersecurity centers are available to support the offered programs in the tenuniversities: 1. Purdue University; Center for Education and Research in Information Assurance and Security (CERIAS) [11]. 2. Georgia institute of technology; Institute for Information Security & Privacy (IISP) [12]. 3. University of Washington; Security and Privacy Research Laboratory (SPRL) [13] & Tech Policy Lab (TPL) interdisciplinary lab [14]. 4. University of Maryland; Maryland Cybersecurity Center (MC2) [15]. 5. University of Illinois at Urbana
reflect on their learnings with the aim of improving theirprogramming skills and the quality of their programs.Introductory programming courses have historically high attrition rates because often studentsare not sufficiently and dynamically engaged with programming tasks. In fact, failure rates of 30to 50% have been reported in literature [1]. Beginners frequently feel frustrated and disenchantedwith the subject since the challenges of learning programming appear to be too overwhelming toovercome. While laboratory components of these courses help students with getting feedbackand encouragement in the face of programming challenges, practice and motivation beyond thelab environment remain uncertain. Therefore, it is necessary to explore
Cybersecurity Education Interventions: Three Case Studies,” IEEE Secur. Priv., vol. 13, no. 3, pp. 63– 69, May 2015.[14] J. M. D. Hill, C. A. Carver, J. W. Humphries, and U. W. Pooch, “Using an isolated network laboratory to teach advanced networks and security,” in Proceedings of the thirty- second SIGCSE technical symposium on Computer Science Education - SIGCSE ’01, 2001, pp. 36–40.[15] T. Bläsing, L. Batyuk, A.-D. Schmidt, A. Camtepe, and S. Albayrak, “An Android Application Sandbox System for Suspicious Software Detection.”[16] J. Mayo and P. Kearns, “A secure unrestricted advanced systems laboratory,” in The proceedings of the thirtieth SIGCSE technical symposium on Computer science education
Fluid Mechanics for annotating an online text and journals papers, with bothprompts by the faculty member seeding the annotation process, along with requirements forstudents to post and respond to questions or annotations made by others. The machine-learningalgorithms that are built into Perusall automatically grade student comments. The instructor canverify that the grade is consistent with their assessment.Referring to their annotated class notes, text, and optional online references, students can applytheir knowledge to design networks and step through the process of configuring network devicesin laboratory activities. As part of the reviews for exams, students can also annotate their classnotes, and their annotated textbook as well. In
stronger than imagined. system for achieving this end goal. ● Lack of User Knowledge and Awareness: the sophisticated functionality of IoTs requires Our study aims to create a guideline for establishing serious awareness of the threats and reasonably affordable, relevant IoT cybersecurity vulnerabilities [16], [17]. Users’ lack of laboratories configured primarily for use at teaching knowledge can make them victims of social institutions. Furthermore, we deliver a set of engineering attacks. algorithms that can be used to better
research scientist at the Canadian Nuclear Laboratories (CNL) from 2013 through 2017. In addition, he was employed at Motorola as a senior soft- ware engineer from 2003 through 2007, and IBM from 2011 through 2013. He received his B.S. and M.S. degrees from Sichuan University, China in 2000 and 2003, respectively, and his Ph.D. degree from Southern Illinois University Carbondale in 2011. His research interests include high-performance com- puting, computer architectures, real-time systems, and wireless sensor networks. He has published over 30 peer-reviewed research papers. American c Society for Engineering Education, 2020 Undergraduate Summer Research in
and howthey can advance to more sophisticated scenarios. Like a computer game, students become excitedto improve their level of knowledge and go beyond a simple laboratory. They develop the datamodel, implement a base, then improve to intermediate and advanced models. Like a game, severalstudents often go beyond and develop additional scenarios of their own interest.1. IntroductionSimulation in education is a well-known and an established field. Engineering education, defensetraining, and medical exercises are a few noticeable examples. As part of the degree requirements,engineering students often learn how to use modeling and simulations for their future workplaces.Whether designing and constructing bridges, buildings, auto vehicles
, Heather Dillon worked for the Pacific Northwest National Laboratory (PNNL) as a senior research engineer.Dr. Nicole Ralston Dr. Nicole Ralston is an Assistant Professor and co-Director of the Multnomah County Partnership for Education Research (MCPER) in the School of Education at the University of Portland in Portland, Ore- gon. She received her Ph.D. in Educational Psychology with an emphasis in Measurement, Statistics, and Research Design from the University of Washington. An elementary school teacher at heart, she now teaches educational research and STEM methods to undergraduate and graduate students. Her research fo- cus involves bringing active learning strategies to STEM, best practices of research-practice
used in the course are discussed. Finally, plans forfuture offerings of this course are reviewed.1. IntroductionThis paper presents the efforts undertaken to develop and the implementation of a flexiblelearning defensive security course. The course covers the CompTIA Security+ requirements andis based on the HyFlex delivery model which was originally developed at San Francisco StateUniversity.This paper discusses how a limited-flexibility model was transformed due to the COVID-19pandemic into a highly flexible delivery model. Specifically, the course went beyond simplyhaving lecture and laboratory components to offering a HyFlex Options Menu where studentsselect between several options for each area of the class. Students were offered the
valuable addition tothe electrical engineering curriculum.We argue that the reasons behind the technical choices, their impact on the resource consumptionand the performance versus flexibility tradeoffs are relevant for cellular communicationsstandards education. Moreover, project management, team work, development of realisticexpectations and practical solutions are skills that are much demanded by industry in addition todomain-specific technical specialization. We therefore propose a methodology for teachingstandards that creates favorable conditions for developing those skills.The combination of lecture-centered education [2] with laboratory-centered approaches [3], [4],has been adopted in the engineering curriculum when the Conceive, Design
information technology tools. Without a laboratory section for the course, the designresults are verified using simulations, for example using MATLAB, MATHCAD or otheravailable programs. It is very important that students first go through problems usingpaper/pencil, back of envelope calculations, with use of calculator before they attemptsimulations, obtaining graphical results from available computing information technology tools.4. CONCLUSIONS. In this paper we have shown how computer information technology (CIT)are used at the right time, right place in an example science and engineering course. Students areencouraged to use paper and pencil, calculator to solve a given problem and do simplecalculation (“back of envelope”) before using software
webbrowser may be the client, and an application on a computer that hosts a website may be theserver. HTTP GET requests focus on requesting data from a server and the server providing therequested data back to the client. HTTP POST requests usually involve a client providing data toa server and the server uploading or storing that information [12].3.2 IoT Emulation through VirtualizationTo adequately measure the effects of available resources (CPU, RAM, and networkingcapability) on IoT botnets, we architected an IoT emulation environment utilizing virtualizationtechniques. Fig. 1 below outlines the high-level topology of our emulation laboratory. The goalof this emulation environment was to remove as many variables as possible and to focus on
includes Writing as well.Kinesthetic (K) Some people learn only by doing. The author would like to include “Tactical LearningMode” also in this category. These learners need hands-on-training. Here one may want toquote the famous phrase: Practice Makes You Perfect. This last, final group prefers to learnthrough experience. It is like performing a Ballet, or playing a Piano or building a modelbridge, etc. It could also be laboratory experience, clinical experience, simulation, case studies,co-op experience, industrial internship experience, service-learning experience, practical trainingexperience, etc. This perceptual mode is referred to as Kinesthetic mode.Additional Resources In addition to the above mentioned ideas, the author has
the semester during theregularly scheduled laboratory sessions, which are otherwise used for the implementation ofcoding concepts and development of programming skills through interactive group activities andcode-writing exercises. The coding interviews provided an opportunity for each student to meetindividually with a Teaching Assistant (TA) or Instructor to discuss the core programmingconcepts of the course in the context of code that the student wrote for a previous assignment.The TAs were trained to keep the interviews as an informal discussion focused on the codingconstructs implemented in the student’s code with primary goals as follows: • To ensure each student is developing fundamental programming skills and to flag those
Computer Science Curriculum," ACM Inroads 2015 June, Vol. 6, No. 235. Wenliang Du and Ronghua Wang, "SEED: A Suite of Instructional Laboratories for Computer Security Education,” (Extended Version) In The ACM Journal on Educational Resources in Computing (JERIC), Volume 8, Issue 1, March 2008.36. Du, W. “The SEED Project: Providing Hands-on Lab Exercises for Computer Security Education.” IEEE Security and Privacy Magazine, September/October, 2011.37. Stefan Boesen, Richard Weiss, James Sullivan, Michael E. Locasto, Jens Mache, and Erik Nilsen. 2014. EDURange: meeting the pedagogical challenges of student participation in cybertraining environments. In Proceedings of the 7th USENIX conference on Cyber Security Experimentation and
internalpassion and help to create a better programmer, a better engineer, a better team member, andbetter person.About the CourseThe introductory programming course (ECCS 1611 Programming 1) at Ohio NorthernUniversity (ONU) consists of one-semester four-credit courses. The course consisting of three50-minute lectures plus a 165-minute laboratory for 15 weeks. Programming 1 is offered in thefall term and focuses on using C++ to implement small programs exercising concepts insequencing, selection, iteration, pointers, basic data structures, and an introduction to Object-Oriented Programming (OOP) design. This course, normally taken in the first year, is requiredfor all ONU students majoring in computer science, computer engineering, or