Asee peer logo
Displaying results 61 - 90 of 96 in total
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
David Dampier, Mississippi State University
Tagged Divisions
Information Systems
Training Center as a Regional Outreach and Service Activity”, Proceedings of the 2007 Hawaii International Conference on the System Sciences, Minitrack on Digital Forensics, Waikoloa, Hawaii, January 3-7, 2007. Page 13.264.910. Whitcomb, C., “An Historical Perspective of Digital Evidence: A Forensic Scientist’s View”, International Journal of Digital Evidence, Vol. 1, Num. 1, Spring 2002. Page 13.264.10
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley State College; Reza Sanati-Mehrizy, Utah Valley State College
Tagged Divisions
Information Systems
systems designknowledge, it is crucial that the curriculums for computer science and engineering to be Page 12.597.2reviewed and enhanced.Currently, there are five models for teaching embedded systems topics in universities andcolleges: 1. Offering courses mostly on software (Real-Time Systems) in CS and SE undergraduate programs (e.g., at Florida State University, Vanderbilt University, Seoul National University …). 2. Offering courses in CE and EE undergraduate programs which emphasizes the hardware aspects of embedded systems (e.g., University of Utah, Boston University, Carnegie Mellon University …). 3. Graduate
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Philip Lunsford, East Carolina University; Chip Popoviciu, Cisco Systems, Inc.
Tagged Divisions
Information Systems
perform configuration and troubleshooting tasks 24hours a day, 7 days a week.Lectures for the course were conducted on campus in the College’s Global Classroom wherestudents could attend in person, view real-time web casts, or watch achieved versions of thelecture.The foundation for the lab portion of the class is the Cisco 2800 series and 2600 series routersthat are part of a standard Cisco Networking Academy CCNP equipment bundle.Students had to meet one of the following prerequisites in order to attend this pilot course;CCNA certification, Network + certification, or completion of Cisco Networking Academy Page 12.988.2CCNA semesters 1 – 4. In
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Michael Moore, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
configuration for these hard drivesis a goal to have the drive configured so that it could boot any modern computer with no moreeffort that selecting it as the boot drive from a BIOS menu.To support web development, the system developed needs to support a variety of development,client, and server software. To accomplish this, the drives should run both Windows and Linux.This could be accomplished through dual-boot partitions, but would preferably be done usinghardware-level virtualization so that both operating systems could be operational simultaneously.Such simultaneous operation allows the student to use the host OS as a server system for testing,and the virtual OS as the client system, as shown in the rightmost system in Figure 1
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ed Crowley, University of Houston; Cheryl Willis, University of Houston
Tagged Divisions
Information Systems
would normally require substantially greater budget andsupport resources.Live CDs and Open Source Tools: Elements of SuccessFour years ago, when we began to develop our security courses, we soon realized that we hadneither the time nor the resources required for a conventional development process. We alsoknew that hands-on activities would be critical. As an analysis of the structure of hands-onactivities, Jeanna Matthews1 has observed: Nearly all (laboratory activities) involve three parts: 1. Configuring the hardware and software to prepare for a networking experiment (e.g. connecting a series of machines with routers, hubs of switches, configuring the machines with hard coded IP address, etc.) 2. Performing an experiment to
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ronald Glotzbach, Purdue University; Nathan Bingham, Purdue University; Meiqi Ren, Purdue University; Dorina Mordkovich, Purdue University
Tagged Divisions
Information Systems
-Stadium couldeasily translate into other communication areas where a mix of real-time and stored informationwould enhance an information space or an experience. The e-Stadium application (see Figure 1) is written in ASP.NET using C# with a SQL Server relational database. The adaptive rendering capabilities of ASP.NET Mobile Forms, which supports over 200 different handheld devices from a single application, are used to deliver content to handheld devices. As a game progresses, statisticians generate an XML document containing individual plays, statistics, drive
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Fani Zlatarova, Elizabethtown College
Tagged Divisions
Information Systems
implementation. Animportant role is assigned to the database query definition, because answering queries is the finalgoal of an information system. Teaching different levels of abstractions and the respectivestrategies for query definition, such as: natural language descriptions, relational algebraexpressions, QBE relational language expressions, SQL language expressions, queryoptimization tools, and miscellaneous recent query applications, would prepare our students forefficient and effective management of information systems.1. IntroductionCurrently, using information systems is part of the daily activities of the global economic, social,and political environments. Many academic institutions introduce new graduate interdisciplinaryprograms involving a
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
Tagged Divisions
Information Systems
component. For example, C /C++ programming course was enhanced with basic ciphering like Caeasr cipher, Javaprogramming was enhanced with Java security concepts, OS course was enhanced with thecoverage of access control, buffer overflow, malicious software, etc., network course wasenhanced with the coverage of insecure protocol and secure protocol etc. The author will discusshow security education can be enhanced in many college courses below.1. IntroductionWhether caused by so many news worthy security incidents or not, security education hasbecome a trend either as a major, a certificate program, a curriculum, or as modules to enhancethe current curriculum nowadays.Security education papersIt was worth noting that security education is noted and
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Frank Kowalkowski, Knowledge Consultants; Gilbert Laware, Purdue University
Tagged Divisions
Information Systems
ever-increasing need for critical assessment ofenterprise problems which demands a different set of analytic and problem-solving skills to Page 11.1200.2assess those requirements. It also requires chaining different types of requirements together. Intoday’s market, it is essential to react to a business situation by (1) formulating the problem, (2)analyzing the problem, (3) searching for solutions, (4) deciding upon an appropriate solution, and(5) specifying the solution. Of course, this approach to analysis has to be accomplished on timeand within budget, and produce high quality results. Many organizations realize that gatheringand
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Luiz Perrone, Bucknell University; Maurice Aburdene, Bucknell University
Tagged Divisions
Information Systems
to write programs in a C-like programming language on personalcomputers using Windows or Linux. Once the software is developed and tested, it can bedownloaded to the Cybiko device. Other software and games can be downloaded to the deviceusing CyberLoad software. The project implements a simplified version of the 802.11 MAClayer on the Cybiko.15 The physical layer emulation, equivalent to that of the 802.11 standard,is given to the students, who are then asked to implement a set of well-defined MAC layerinterfaces on top of the physical layer interface, so that the application programs may use the setof MAC interface directly. Figure 1 illustrates the concept of the project. 802.11 MAC emulation project (students
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Shelton Houston, University of Southern Mississippi; Christopher Herrod, University of Southern Mississippi; Steven Blesse, University of Southern Mississippi
Tagged Divisions
Information Systems
. The networktopology for the facility had to be highly configurable to support multiple networkconfigurations. Figure 1 shows the design of the facility network topology using managedswitches and Inter-VLAN routing.BackgroundOther constraints that impacted the program were vendor specific courses that had to bearticulated. Specifically, the Cisco Networking Academy Program (CNAP) had to bearticulated with eight different community colleges in the state. In addition to a fourcourse sequence offered at the community colleges, an additional four course sequencewas required because the four-year IT program included the Cisco Certified NetworkProfessional (CCNP) program. Seven out of eight Cisco courses required use of thefacility. Since Cisco
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University; Guy Hembroff, Michigan Technological University
Tagged Divisions
Information Systems
hands-on experience onInternet security, especially DDoS attack, detection and defense mechanisms.1. IntroductionNetwork security is a topic gaining tremendous interests in today’s Information Technologyworld. The increasing frequency and severity of network attacks in recent years reveal somefundamental security issues of Internet environment. Significant efforts from university andindustry have been made to improve computer and network security. It is vital to incorporatethe latest research results in higher education and academic programs to provide training andeducation to college students and cyber security professionals.College seniors in Computer Network & System Administration (CNSA) program [1] atMichigan Technological University
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy; Curtis Welborn, Utah Valley State College; Afsaneh Minaie, Utah Valley State College
Tagged Divisions
Information Systems
example that will be improved gradually through the paper.Capturing Business RulesFigure 1 is an Entity Relationship Diagram that depicts the following information about airplanemechanics. A mechanic is an individual with skills that allows him to maintain airplanes. Amechanic must receive specific types of training related to maintaining airplanes. There aremany different types of training that a mechanic can receive for maintaining airplanes, such astraining on landing gear, training on engines, training on electronics, and so on. In turn, thetypes of training that a mechanic receives are used to determine the types of maintenanceservices that the mechanic can perform on an airplane. A specific maintenance service mayrequire that a mechanic
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Phillip Wilson, Texas A&M University-Corpus Christi; John Fernandez, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
state of the individual at thetime of the assessment. This E-Quality score is computed as the difference between theaverage of the pleasant emotions (happiness, interest and surprise) and the average of theunpleasant emotions (contempt, disgust, shame, fear, anger, distress, sadness andanxiety). The difference is then recalibrated to range from +100 to -100. The result is ameasure that reflects a more satisfying overall emotional state as the measure approaches Page 11.919.3+100 and an increasingly uncomfortable state as the score approaches -100. In addition,the Emogram results for each emotion can range from a low value of one (1) to a highscore of
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
discretize any of the attributes. Theexperiment was carried out using the normal data as the training data and a subset of attack dataas the test data initially and subsequently using attack data as both training and test data. Wekacannot handle large datasets since it loads everything into memory before it processes the data.To overcome this shortcoming, 5,900 records were generated randomly from the normal data andtwo sets of 6,600 and 3,400 records were generated randomly from the attack data. The subset ofattack data with 3,400 records was used as test data in both cases. The results of using J4.8decision tree on the data are presented in Table 1.Normal data as training data and attack data as test data: Here the normal data (attack-freesubset
Conference Session
POTPOURRI
Collection
2010 Annual Conference & Exposition
Authors
Edward Gehringer, North Carolina State University
Tagged Divisions
Information Systems
surveys, one of studentswho took open-book open-Web exams, and one of instructors who administered onlineexams.1. IntroductionIn today’s world, tests and exams are given in an environment that is increasingly artificial.Most technical work is done with computers. Few people would attempt to write acomputer program, analyze forces on a building, or even write a piece of prose, without theaid of a computer. But that’s just the kind of environment we place our students in whenthey take an exam.All of the leading learning-management systems and textbook publishers have online testingmodules that can be used to deliver quizzes or exams. However, few instructors havecompletely done away with paper exams. Online exams preclude certain types of questions
Conference Session
IT-based Instructional Technologies
Collection
2010 Annual Conference & Exposition
Authors
Edward Gehringer, North Carolina State University; Abhishek Gummadi, North Carolina State University; Reejesh Kadanjoth, North Carolina State University; Yvonne Marie Andrés, Global Schoolnet.org
Tagged Divisions
Information Systems
. Scoresfor reviewing can be factored into the student’s grade. Leaderboards allow students to see,with permission, who are the class leaders in categories such as submitted work and reviewquality. We are currently working on implementing an approach to awarding extra credit toreviewers for interacting with their authors more frequently than required.1. MotivationOnline gaming plays an important role in the lives of many of our students. They competewith each other to earn points and achieve status. The rewards motivate them to spendhours working on task. Suppose we could entice our students to contribute to each other’slearning experience by awarding points for providing formative feedback and answers toeach other’s questions. This, it turns out
Conference Session
Information and Network Security
Collection
2010 Annual Conference & Exposition
Authors
Xiangchun Cheng, Zhejiang University of Technology; Min Chen, Zhejiang University of Technology; Rong Gu, WWW.ZJUT.EDU.CN; Yingzhen Weng, Zhejiang University of Technology
Tagged Divisions
Information Systems
of trainingprograms for complex skills. According to its four components: learning tasks, supportiveinformation, just-in-time (JIT) information and part-task practice, by analyzing the skills ofautomobile engine assembly together with documents investigation and interview to the master Page 15.110.3about the engine assembly, we designed the framework of the AEVAS as shown in Fig.1. Figure 1. The Framework of Automobile Engine Virtual Assembly SystemThe AEVAS is composed of the following four modules: Knowledge Room, Assembly Room,Expert Room and Checking Room. Knowledge Room: Knowledge Room is the first part after the trainees login
Conference Session
Emerging Information Technologies
Collection
2010 Annual Conference & Exposition
Authors
Nipul Patel, Purdue University, North Central
Tagged Divisions
Information Systems
other providers dotheir jobs, a prospect that is likely to meet resistance. Finally, a number of technological,regulatory, economic, and structural issues will have to be addressed before wirelesstechnologies become part of mainstream medical care.Types of ApplicationsThere are two major categories of wireless applications for health care: (1) applications thatmonitor physiological functions (in cardiac and diabetic patients, for example) and send theinformation to physicians; and (2) applications that provide information and feedback directly topatients, thus encouraging them to pay attention to and take a more active role in managing theirhealth.Applications that enable remote monitoring of various physiological functions are among themost
Conference Session
POTPOURRI
Collection
2010 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, University of Pennsylvania; Afsaneh Minaie, Utah Valley University; Chad Dean, Utah Valley University
Tagged Divisions
Information Systems
were not considered for this study but it is interesting to note that graduate levelcourses follow the same basic patterns discovered in the undergraduate courses.In this study, we discovered four different teaching models used by different universities toteaching data mining at the undergraduate level. These four different models are:Mathematical/Algorithm Based, Textbook Based, Topical Based, and Applied Data Mining. Ofthe nine schools we researched, five followed the same pattern. The remaining four schools aredivided among three different approaches as showed in figure 1. Page 15.646.2 Mathematical
Conference Session
Emerging Information Technologies
Collection
2010 Annual Conference & Exposition
Authors
Hugh Jack, Grand Valley State University
Tagged Divisions
Information Systems
commercialization. In August 2009 thematerials were moved to a private website to allow commercialization.Over time the author has explored various approaches to structuring and optimizing the websitefor his own materials. In the next stage of the work the site is being expanded to multiple authors.DesignA sample of a web page from the site is shown in Figure 1. The content is the major portion of thescreen, while the left and top side shows the look-and-feel in January 2010. The critical features Page 15.67.2of the page are a clear title at the top of the screen. On the left hand side is a Logo with a link tothe main site, a search bar, followed by some
Conference Session
IT-based Instructional Technologies
Collection
2010 Annual Conference & Exposition
Authors
Yi-Cheng Chen, Meiho Institute of Technology; Yi-Chien Lin, Meiho Institute of Technology; Ron Chuen Yeh, Meiho Institute of Technology, Taiwan; Kuo-Hung Tseng, Meiho Institute of Technology
Tagged Divisions
Information Systems
-Ministry of Education indicatedthat most of colleges have started to plan and establish e-commerce educational environments. Inaddition, they pondered on how to fit the internet properly in management courses. For examples,Dayeh university and National Yunlin University of Science & Technology set up electronicstores; National Taiwan University of Science & Technology has done the completion ofbuilding website of e-commerce instruction; and Feng Chia University built professionalcommercial website for supply information about insurance and finance. There are severalpractical strategies of e-commerce education in Taiwan organized as follows:1. To establish e-commerce lab or e-commerce center for facilitating relevant research and
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2010 Annual Conference & Exposition
Authors
Ashley Banaszek, Missouri University of Science and Technology; Hong Sheng, Missouri University of Science and Technology; Richard Hall, Missouri University of Science and Technology; Ronaldo Luna, Missouri University of Science and Technology; Ghulam Bham, Missouri University of Science and Technology
Tagged Divisions
Information Systems
questionnaireitems. This analysis provided more detail regarding the perceived usefulness of the module.Combined analysis revealed a link between students’ perceived usefulness of the material andtheir motivation to learn. Analysis also supported the learning tool’s effectiveness and justifiedits further implementation and investigation.IntroductionA Geographic Information System is a computer application that allows data to by interpretedand visualized in many ways.1 This technology is being employed in the field of engineeringto better view and understand data collected by surveyors and satellites. Other industries,government, and education are using and exploring the applications of GIS as well. With thegrowing need for engineers that are knowledgeable
Conference Session
Emerging Information Technologies
Collection
2010 Annual Conference & Exposition
Authors
Susan Miertschin, University of Houston; Cheryl Willis, University of Houston
Tagged Divisions
Information Systems
cloud definition. SIGCOMM Comput. Commun. Rev., 39(1), 50-55.10. Voas, J., & Zhang, J. (2009). Cloud Computing: New Wine or Just a New Bottle? IT Professional, 11(2), 15-17.11. What is Cloud Computing? (2008). joyent.com. Page 15.150.10
Conference Session
Emerging Information Technologies
Collection
2010 Annual Conference & Exposition
Authors
J. Wey Chen, Southern Taiwan University
Tagged Divisions
Information Systems
give novice powerful intuitionsfor using a programming language by further representing and dividing programming knowledgeaccording to its level of difficulty in four cognitive categories. Figure 1 shows a combined modelused by the study to represent the knowledge structure of every learning node(concept). Figure 1. Knowledge structure for each learning nodeThe study found that instruction developed in this structured sequence prompted the acquisition ofthe next higher level of computer programming learning. Moreover, students were found tocommit less of the common programming mistakes if these five levels of thought were properlymodeled.The Subjects and Bayesian Training DataThis study employs the data generated by sixty
Conference Session
Information and Network Security
Collection
2010 Annual Conference & Exposition
Authors
Hetal Jasani, Northern Kentucky University
Tagged Divisions
Information Systems
variouscommands, students find the name of Ethernet, radio and BVI interfaces, SSID, MAC address,BIA (burned-in address), bandwidth (BW), default IP address of Ethernet, radio and BVIinterfaces. Students setup password to access control the AP for enhanced security. Students alsosetup IP address, SSID, and authentication method using command line interface. In addition,students setup http secure server using various Cisco commands on Cisco AP to access it viabrowser securely. Figure 1 and Figure 2 show the general network diagram for this lab setup andsome of the later discussed labs.In this lab activity, students get to know the basic commands of Cisco IOS that students areexpected to know from their first network administration course (i.e., prereq
Conference Session
IT-based Instructional Technologies
Collection
2010 Annual Conference & Exposition
Authors
Javad Shakib, DeVry University; Mohammad MUQRI
Tagged Divisions
Information Systems
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2010 Annual Conference & Exposition
Authors
C. Richard Helps
Tagged Divisions
Information Systems
of the change process.1. IntroductionIt is well recognized that computing changes constantly and rapidly. The influence ofexponential growth of computing power driven by Moore’s law is often cited as a majorcontributing influence in this change. The implications of this law are far broader than GordonMoore’s original statement about the doubling of integrated circuit components on a die1,2,3 and,in general terms electronic systems, particularly computer-based systems, continually and rapidlygrow smaller, cheaper and much more powerful Moore’s law effectively dominates computersystem development.A consequence of this unrelenting, exponential change is the expectation and need for universityinstructors to both continually update their own
Conference Session
Information and Network Security
Collection
2010 Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University; Ricardo Monterrosa, DeVry University; Rammy Badran, DeVry University
Tagged Divisions
Information Systems
RFID system, there can be a significant decrease in the amount of mishandled luggage.There are different types of RFID tags and readers in the market. The tags are the maincomponents of the system because they contain unique identification numbers. The tag can beactive with an internal power supply, or passive, which draws power directly from a reader.Table 1 is a quick reference to several available RFID technologies. Frequency Type Application Range125 KHz – 148 KHz Passive Animal tracking, access control, Ranges from 0.5 inch to one and OEM applications. foot.13.56 MHz Passive EAS (anti-theft), book and
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2010 Annual Conference & Exposition
Authors
Thomas Hacker, Purdue University, West Lafayette
Tagged Divisions
Information Systems
AC 2010-803: HANDS-ON HIGH PERFORMANCE COMPUTING: DEVELOPINGA CLUSTER COMPUTING COURSE FOR REAL WORLD SUPERCOMPUTINGThomas Hacker, Purdue University, West Lafayette Page 15.637.1© American Society for Engineering Education, 2010 Developing a Course for Hands-on High-Performance ComputingAbstractHigh-performance computing (HPC) based on commodity hardware and open-source softwarehas become the dominant paradigm for supercomputing today.1, 2 Thus a great unmet need existsfor skilled students and practitioners who can design, develop, deploy, and operate HPC-basedsystems to support discoveries in industry and academe.To address these needs, we have developed two courses in