Asee peer logo
Displaying all 18 results
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Barry Lunt, Brigham Young University; Michael Bailey, Brigham Young University; Joseph Ekstrom, Brigham Young University; C. Richard Helps; David Wood
Tagged Divisions
Information Systems
AC 2007-687: RANKING SCHOLARLY OUTLETS FOR INFORMATIONTECHNOLOGYBarry Lunt, Brigham Young University Dr. Barry M. Lunt is a professor of Information Technology at Brigham Young University, Utah, where he has taught for over 14 years. He has also taught at Utah State University (Logan, UT) and Snow College (Ephraim, UT). Before entering academia, he was a design engineer for IBM in Tucson, AZ. His research interests presently include engineering and technology education and long-term digital data storage.Michael Bailey, Brigham Young UniversityJoseph Ekstrom, Brigham Young UniversityC. Richard G. Helps, Brigham Young UniversityDavid Wood, Indiana University David is a Ph.D. student in accounting. He
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Philip Lunsford, East Carolina University; Chip Popoviciu, Cisco Systems, Inc.
Tagged Divisions
Information Systems
, project management, and Cisco systems networking solutions. He holds a MBA from Wayland Baptist University. He also holds various industry certifications to include; A+, Network+, MCSE, MOUS, and CCNP.Philip Lunsford, East Carolina University Phil Lunsford received a B.S. in Electrical Engineering and a M.S. in Electrical Engineering from Georgia Institute of Technology and a Ph.D. in Electrical Engineering from North Carolina State University. He is a registered professional engineer and is currently an Assistant Professor at East Carolina University. His research interests include system simulation, telemedicine applications, and information assurance.Chip Popoviciu, Cisco Systems, Inc
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Robert Walters, Pennsylvania State University; John Bertoty, Blueroof Technologies, Inc.
Tagged Divisions
Information Systems
AC 2007-1219: TECHNOLOGICAL ASPECTS OF A SMART COTTAGE FORSENIORSRobert Walters, Pennsylvania State UniversityJohn Bertoty, Blueroof Technologies, Inc. Page 12.1375.1© American Society for Engineering Education, 2007 Development of a Smart Cottage for SeniorsAbstractThis paper presents the design, development and construction of a new kind of housing for seniorcitizens. A Smart Cottage for Seniors has been developed that is accessible, affordable and containstechnology to keep the seniors at home longer, safer and healthier. The cottage uses Universal designtechniques that ensure that the cottage will change with the needs of the occupants. A
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
Warith Al-Sulaimani, Modern College of Business and Science-Sultanate of Oman; P Mani Joseph, Modern College of Business and Science-Sultanate of Oman; Saeid Moslehpour, University of Hartford
Tagged Divisions
Information Systems
AC 2007-1360: A STUDY ON THE PERFORMANCE OF BLUETOOTH AND IEEE802.11B COEXISTENCEWarith Al-Sulaimani, Modern College of Business and Science-Sultanate of Oman Warith Al-Sulaimani is a Lecturer and Consultant at the Modern College of Business and Science, Oman. Warith earned a Bachelor’s Degree in Electronic & Electrical Engineering from the University of Strathclyde (UK), a Diploma in Computers and Information Systems from Sultan Qaboos University (Oman) and Master’s Degree in Advanced Computer networking from Glasgow Caledonian University (UK). His primary research focus is in the areas of Wireless Networking, Internet Technologies and Network Security. He holds certifications in A
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
Robert E. Broadbent, Brigham Young University; Michael Bailey, Brigham Young University; Joseph Ekstrom, Brigham Young University; Scott Hart, Brigham Young University
Tagged Divisions
Information Systems
AC 2007-1400: EXPLORATION OF JAVA PERSISTENCERobert E. Broadbent, Brigham Young UniversityMichael Bailey, Brigham Young UniversityJoseph Ekstrom, Brigham Young UniversityScott Hart, Brigham Young University Scott is an IT undergraduate working in the areas of information retrieval, and document management. Page 12.721.1© American Society for Engineering Education, 2007 Exploration of Java PersistenceAbstractData persistence in a relational database is one of the core requirements of many applications.There are a variety of methods for implementing data persistence; however the advantages
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
Janell Armstrong, Brigham Young University; C. Richard Helps, Brigham Young University
Tagged Divisions
Information Systems
education. He also has interests in human-computer interfacing. He has been involved in ABET accreditation for about 8 years and is a Commissioner of CAC-ABET and a CAC accreditation team chair. He spent ten years in industry designing industrial automation systems and in telecommunications. Professional memberships include IEEE, IEEE-CS, ACM, SIGITE, ASEE. Page 12.380.1© American Society for Engineering Education, 2007 Comparative Evaluation of ZigBee and Bluetooth: Embedded Wireless Network Technologies for Students and DesignersAbstractNetworked
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Hugh Jack, Grand Valley State University
Tagged Divisions
Information Systems
AC 2007-2585: PREPARING FOR ELECTRONIC TEXTBOOKSHugh Jack, Grand Valley State University Hugh Jack is the Chair of Product Design and Manufacturing Engineering at Grand Valley State University in Grand Rapids Michigan. His interests include controls, automation, and open source software. Page 12.1177.1© American Society for Engineering Education, 2007 Preparing for Electronic TextbooksAbstractElectronic copies of books are becoming increasingly common. Examples of these include noned-itable PDF files, or fully editable books based on the Wiki model17. Electronic books are wellsuited to
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Edward Gehringer, North Carolina State University
Tagged Divisions
Information Systems
AC 2007-2328: ACTIVE AND COLLABORATIVE LEARNING STRATEGIES FORTEACHING COMPUTINGEdward Gehringer, North Carolina State University Edward F. Gehringer is an associate professor in the Department of Computer Science, North Carolina State University. His research interests include hardware and software support for memory management, architectures for security, object technology, and educational software for collaborative learning. Page 12.167.1© American Society for Engineering Education, 2007 Active and Collaborative Learning Strategies for Teaching Computing Edward F
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Julie Mariga, Purdue University
Tagged Divisions
Information Systems
development and network engineering technology. She has co-authored a textbook, edited a second textbook, and written five chapters for other texts. She has published two journal articles and over twenty referred articles and has written or co-authored numerous grants aimed at increasing the number of women students in CIT. She serves as an Associate Editor for the International Journal of Information and Communication Technology Education. She has been the recipient of numerous teaching awards at the department, college, and university levels. She is actively involved in the academic alliance for the National Center for Women & Information Technology (www.ncwit.org), served as
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Judith Challinger, California State University, Chico; Rachael Teasdale, California State University, Chico
Tagged Divisions
Information Systems
AC 2007-1538: VISIT – VISUALIZATION AND INFORMATION TECHNOLOGY -A MULTI-TIER SYSTEM FOR INTERDISCIPLINARY EXPERIENCES IN DATACOLLECTION AND VISUALIZATIONJudith Challinger, California State University, ChicoRachael Teasdale, California State University, Chico Page 12.1590.1© American Society for Engineering Education, 2007 VisIT - Visualization and Information Technology - A Multi-tier System for Interdisciplinary Experiences in Data Collection and VisualizationAbstractCollaboration on interdisciplinary teams is an important experience for computer sciencestudents, and one that is too rarely available. Methods for data
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley State College; Reza Sanati-Mehrizy, Utah Valley State College
Tagged Divisions
Information Systems
the requirements of 30 credit hours of core courses common to allcomputer science students. The students continue taking core courses until the first semester oftheir junior year, when they begin taking their electives from different specialization areas.In this paper, the authors are proposing a new area of specialization in their computer sciencedepartment called Embedded Systems Engineering. The paper elaborates the detail content ofthe curriculum requirement for this track.Embedded Systems EngineeringThe area of Embedded Systems Design has been gaining a tremendous growth in recent years. Amajor aspect of this growth has been the addition of networking technologies and operatingsystems to embedded systems. Embedded systems have
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Xiaoxi Martin, Western Carolina University; Brant Price, Western Carolina University; James Zhang, Western Carolina University; Duane Dunlap, Western Carolina University; Robert Adams, Western Carolina University
Tagged Divisions
Information Systems
AC 2007-894: A DATABASE AND USER INTERFACE DESIGN FOR A REMOTEACCESSIBLE ENGINEERING LABORATORYXiaoxi Martin, Western Carolina University Xiaoxi Martin received her Bachelor of Science in Electrical and Computer Engineering Technology from Western Carolina University. Currently she is a Master of Science in technology student with the Department of Engineering and Technology at the Kimmel School of Construction Management, Engineering, and Technology, Western Carolina University.Brant Price, Western Carolina University Brant Price received his Bachelor of Science in Electrical and Computer Engineering Technology from Western Carolina University. Currently he is a Master of Science in technology
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Sohail Anwar, Pennsylvania State University-Altoona College; Jungwoo Ryoo, Pennsylvania State University-Altoona College; Harpal Dhillon, Excelsior College; David Barnes, Pennsylvania State University-Altoona College
Tagged Divisions
Information Systems
AC 2007-1394: AN INTERDISCIPLINARY APPROACH TO INFORMATIONSYSTEMS SECURITY EDUCATION: A CASE STUDYSohail Anwar, Pennsylvania State University-Altoona College Dr. Sohail Anwar is currently serving as an associate professor of engineering and the Program Coordinator of Electrical Engineering Technology at Penn State University. Altoona College. Since 1996, he has also served as an invited professor of Electrical Engineering at IUT Bethune, France. Dr. Anwar is serving as the Production Editor of the Journal of Engineering Technology and an Associate Editor of the Journal of Pennsylvania Academy of Science.Jungwoo Ryoo, Pennsylvania State University-Altoona College Jungwoo Ryoo is an Assistant
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Shelton Houston, University of Southern Mississippi; Billy Walters, University of Southern Mississippi; Tulio Sulbaran, University of Southern Mississippi
Tagged Divisions
Information Systems
AC 2007-1013: KATRINA – AN INTERNSHIP OPPORTUNITYShelton Houston, University of Southern Mississippi Dr. Houston is a professor in the School of Computing at the University of Southern Mississippi. Dr. Houston has been involved in engineering technology education for 27 years. and has 10 years consulting experience in personal computer systems.Billy Walters, University of Southern Mississippi Prof. Walters holds a Masters of Science degree in Computer Science from The University of Arizona. Prof. Walters’ career includes academic and professional appointments. He has experience working at the Johnson Space Center, with secure government contractors, and directing law enforcement
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Ed Crowley, University of Houston
Tagged Divisions
Information Systems
AC 2007-2819: DEVELOPING BASIC CRYPTOGRAPHY LAB MODULES WITHOPEN SSLEd Crowley, University of Houston Page 12.490.1© American Society for Engineering Education, 2007 Developing Basic Cryptography Lab Modules with OpenSSLPerceived topic: Innovative TeachingKeywords: Security, Cryptography, Open Source, Lab Development, NetworkingWhile there has been a recent proliferation of quality cryptography texts, there remains ashortage of quality applied laboratory exercises and related support materials. In part, thisis due to the cost and availability of commercial cryptographic software. In part, this isdue to the time and resource commitment required to develop laboratory
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Azzedine Lansari, Zayed University; Akram Al-Rawi, Zayed University; Faouzi Bouslama, Université Laval
Tagged Divisions
Information Systems
AC 2007-1558: ASSESSING THE EFFECTIVENESS OF AN OUTCOME-BASEDINFORMATION SYSTEMS CURRICULUMAzzedine Lansari, Zayed University Azzedine received a Ph.D. in Bioengineering from North Carolina State Uni-versity in 1992. From 1992-1998, he was a senior researcher at Computer Sciences Corp. and MANTECH, Inc. He joined Zayed University in August 1998. Currently he is an assistant professor of Information Technology. His teaching interests include instructional technology and statistical modeling. His research interests include systems modeling, educational technology and curriculum design in Information Systems.Akram Al-Rawi, Zayed University Akram is a Professor of Conputer Science at King
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Michael Moore, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
laboratory environment, we imaged the lab machines so that students logged intothe machines using their ID, as managed by the College of Engineering and Technology. Thecustomized login process then created a local user with admin privileges, providing us a binding Page 12.878.6between the student and the IP address for network traceability purposes. Since the studentscontrol the images on the external drive, there is now no way to guarantee that we know who isusing the physical hardware in the lab, and no way to trace network activity back to a student ID.Since traceability is a university requirement, in the long term we must find a solution to
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
AC 2007-173: USING DATA MINING TO DETECT INTRUSIONS IN COMPUTERNETWORKSMario Garcia, Texas A&M University-Corpus Christi Page 12.1542.1© American Society for Engineering Education, 2007 Using Data Mining to Detect Intrusions in Computer NetworksAbstractIn recent years Data mining techniques have been applied in many different fields includingmarketing, manufacturing, process control, fraud detection and network management. Over thepast several years a growing number of research projects have applied data mining to variousproblems in intrusion detection. The goal of this research is to design and implement an anomalydetector using data mining. The project