AC 2008-1887: INTEGRATED CURRICULUM AND LABORATORYDEVELOPMENT OF AN UNDERGRADUATE TELECOMMUNICATIONS ANDCOMPUTER NETWORKING PROGRAMShuju Wu, Southeast Missouri State University Shuju Wu (swu@semo.edu) is an Assistant Professor in the Department of Industrial and Engineering Technology at Southeast Missouri State University. She received her Ph.D. degree from the University of Pittsburgh. Her current teaching and research interests include telecommunications and computer networking, IP and overlay multicast, system design and analysis, and wireless ad hoc networks.Ragu Athinarayanan, Southeast Missouri State University Ragu Athinarayanan received his Masters and PhD degree in Electrical Engineering
. However, they differ in some topics such as CCNA certificate requiredetailed knowledge about Cisco Internetwork Operating System (IOS), while Network+certificate require broader knowledge about different network operating systems. The advantagesand disadvantages of integrating IT certificates in the IS curriculum along with other integrationissues have been addressed by few authors1,2,5,6.2.1 Network+The CompTIA Network+ certification is an international industry credential that validates the Page 11.787.3knowledge of networking professionals. Acquiring the Network+ certificate is equivalent to atleast nine months of experience in network support
is designed for students who seek to develop their problem-solving andanalytical skills. Degree candidates in engineering, mathematics and science, as well as workingprofessionals who wish to advance their careers or gain certification are attracted by the depth ofthis curriculum. The CCNA Exploration curriculum is designed to be integrated into varioustechnology curricula or programs offered at postsecondary institutions such as technical schools,colleges, and universities. In this paper the content of classical networking textbooks, includingwell established reference books1, 2, 3, are reviewed for the purpose of developing an effectivenetworking curriculum. Various objectives of the Cisco networking academy, which is a set ofwell
arecollected. The data is then compiled and analyzed for each course. Results of the analysis arecompared to the course outcome matrix and used to update the achievement levels, refine the setof learning outcomes, or adjust the course learning experiences. This process allows facultymembers to examine how successful they were in integrating learning outcomes in their courses.Furthermore, an in-depth analysis may be performed on a regular basis to assess theeffectiveness of the IS curriculum in integrating various learning outcomes. Based on thisanalysis, specific learning outcomes may be modified or replaced as needed. This is a dynamicprocess that allows the IS curriculum to stay current and effective in focusing student learning as
of specialization while it can be an elective for the other areas. Page 14.704.2 Proceeding of the 2009 American Society for Engineering Education Annual Conference & Exposition Copyright © 2009, American Society for Engineering EducationThe following sections outline the Database Engineering curriculum and then the content of thenew Data Mining course will be presented.Database Engineering CurriculumCurrently, our Computer Science department is offering a Database Area of Specializationwithin computer science program. In order to graduate with a Computer Science degree, studentsmust complete 123 semester
from it. There is no doubt that it is a great idea toteach a data mining course in computer science curriculum. As you can tell, students taking adata mining course need to have background in quite a few areas to be successful. Not everystudent taking this course may have the background required in all these areas. The question ishow can an instructor remedy the challenge of teaching a group of students with widely-rangingbackgrounds, and at what level should this course be taught. Furthermore, the issue of groupwork arises, specifically as to whether data mining course projects should be accomplishedindividually or as teams.Studies show that many universities are teaching data mining course(s) within their computersscience curriculum. Each
AC 2008-1581: A COURSE SEQUENCE FOR INTEGRATING PROBLEMSOLVING AND CRITICAL THINKING IN A HYBRID OUTCOME-BASED IS/ITCURRICULUMAzzedine Lansari, Zayed University Azzedine Lansari received a Ph.D. from North Carolina State University in 1992. From 1993-1998, he was a senior researcher at MANTECH, NC. He joined the College of Information Systems at Zayed University in 1998. Currently he is an Associate Professor in the College of Information Technology. His research interests include systems modeling, educational technology and curriculum design in Information Systems.Akram Al-Rawi, Zayed University Akram Al-Rawi is a Sun certified Java Programmer and a Professor of CIS at Zayed University
2006-960: CHANGING TIMES: THE STATUS OF COMPUTING EDUCATION INTHE UNITED STATESBarry Lunt, Brigham Young University Barry M. Lunt is an Associate Professor of Information Technology at Brigham Young University in Provo, UT. Dr. Lunt received a B.S. and an M.S. degree in EET from BYU, and a Ph.D. in Occupational and Adult Education from Utah State University in Logan, UT. He has spent seven years in industry as a design engineer, and 19 years in engineering technology education. His present research emphases are the physical design of electronic circuits and systems, IT curriculum, and engineering technology education.Joseph Ekstrom, Brigham Young University Joseph J. Ekstrom (Ph. D
task. To prepare our students for parallel programming, it is essentialthat parallel design of software be integrated into the undergraduate Computer Sciencecurriculum. Parallel programming represents the next turning point in how software developerswrite software9. In the Computer Science Curriculum 2008 (An interim revision of CS 2001),within Recent Trends section, there is a section on the growing relevance of concurrency whichsays that“The development of multi-core processors has been a significant recent architecturaldevelopment. To exploit this fully, software needs to exhibit concurrent behavior; this placesgreater emphasis on the principles, techniques and technologies of concurrency.Some have expressed the view that all major future
. Dr. Ciprian Popoviciu, CCIE, is a Technical Leader at Cisco Systems with over nine years of experience in data and voice over IP communications technologies. As part of Cisco's Network Solution Integration Test Engineering (NSITE) organization, he currently focuses on the architecture, design and validation of large IPv6 network deployments in direct collaboration with Service Providers and Enterprises worldwide. Ciprian is a regular speaker or chair at conferences and industry events and contributes to various technology publications. He is an active contributor to the IETF standards, he is a Senior member of IEEE and member of several academic advisory boards. Ciprian is co-author of the
veracity of data needed to build a user model.Information acquisition and verification may be difficult if users are neither interested norwilling to provide the required information needed by an adaptive hypermedia system 26.The investigation attempts to offer a new approach for the autonomous computer-basedassessment of a user’s preferred cognitive style required for effective user modeling in adaptivehypermedia systems. The research bridges work in the fields of computer science, psychology,and information science in order to: • Make a contribution to the field of computer science by integrating cognitive style theory Page 11.251.5 and
Enterprise Analysis (Prentice – Hall, ISBN 0-13-282-3365) and over 70 papers. Frank has been the keynote speaker as well a conference chair at several conferences. He conducts frequent seminars nationally and internationally on a variety of business management and information technology topics.Gilbert Laware, Purdue University Gil Laware is an Associate Professor at Purdue University in Computer Information & Technology department. He has over 30 years of consulting and industry experience in projects that span world-wide data management and web/database solutions, business process and knowledge management, and enterprise application integration. He is the Vice President of Research
predominately UNIX-based while the other ispredominately Microsoft Windows-based. DNS, e-mail, file sharing, network printing, iSCSI-based storage area networking, and time synchronization services are deployed with replicationand integration between the disparate platforms across the zones.Revised Routing & Switching CourseThe basic routing and switching course of this curriculum was intended to provide students withfoundational knowledge in a variety of topics relating to the design, construction, maintenance,and monitoring of enterprise networks. The lecture and laboratory components of this courseprimarily include discussion of LANs and WANs from an enterprise perspective. However, inintroducing and expanding on advanced infrastructure topics
to deepen and broaden her knowledge of a key application domain for information systems. She has taught both online and hybrid courses and is interested in enhancing the quality of online learning experiences.Cheryl Willis, University of Houston Cheryl Willis is an Associate Professor of Information Systems Technology at the University of Houston. She received her Ph.D. in Curriculum and Instruction from the University of Florida. Her teaching focus is primarily on applications development and database management. Her research interests include curriculum revision processes for career and technology programs; service learning in information technology undergraduate programs and the use of
University Azzedine Lansari received a PhD in Bioengineering from North Carolina State University in 1992. From 1992-1998, he was a senior researcher at Computer Sciences Corp. and MANTECH, Inc. He joined Zayed University in August 1998. Currently he is an associate professor of Information Technology. His teaching interests include instructional technology and statistical modeling. His research interests include systems modeling, educational technology and curriculum design. Page 13.768.1© American Society for Engineering Education, 2008 Integrating the Security+ exam Objectives
. Thedecentralized virtual lab can provide 24x7 availability because a student does not need to shareany equipment with others. Virtualization technology has helped improve and will continuehelping enhance distance learning through remote labs.AcknowledgmentsThis project is part of the ongoing effort to integrate virtualization technology into ourcurriculum. I would like to extend thanks to Dr. Tijjani Mohammed, Dr. Phil Lunsford, Dr.Chengcheng Li, and Mr. Lee Toderick for their help and support.Bibliography1. P. Li, P. Lunsford, T. Mohammed, L. Toderick, and C. Li, “Using Virtual Machine Technology in an Undergraduate Intrusion Detection Lab”, Proceedings of 2007 ASEE Annual Conference and Exposition, Honolulu, Hawaii, USA, June, 2007.2. P. Li, T
offers a perspective of how Penn State University-Altoona College, anundergraduate institution in Pennsylvania is taking steps to integrate ISA education into its four-year electromechanical engineering technology program. The college realizes that it is highlyimportant for its engineering students to be knowledgeable about information systems securitysince engineers are now expected to have at least a basic understanding of current threats, theconstant change in the nature of those threats, how these threats affect product development,personal safety, employee productivity, and organizational expenses.IntroductionThe specific intent of an information systems security education curriculum should be to trainprofessionals who are able to analyze
AC 2009-1819: EXAMINING THE IMPLICATIONS AND CHALLENGES INCLOUD COMPUTING ENVIRONMENTS: AN EXPLORATORY STUDYNipul Patel, Purdue University, North CentralBryan Marshall, Georgia College and State University Page 14.599.1© American Society for Engineering Education, 2009 EXAMINING THE IMPLICATIONS AND CHALLENGES IN CLOUD COMPUTING ENVIRONMENTS: AN EXPLORATORY STUDYAbstractCommercial enterprises are increasingly utilizing cloud computing as a solution tofluctuating capacity challenges. Cloud computing offers the possibility of on-demandcapacity, allowing commercial enterprises to “tweak” their network infrastructure basedon increased or decreased
validations, etc.Lakshmi Munukutla, Arizona State UniversityBert Valenzuela, Arizona State University Page 13.936.1© American Society for Engineering Education, 2008 NOVEL TECHNOLOGY FOR ELECTRONICS INSTRUCTION – AN ELECTRONICS STUDIOAbstractArizona State University’s Polytechnic campus recently received funding from theNational Science Foundation (NSF) under the Advanced Technology Education Program,or ATE grant, targeted for curriculum development. The program described in this paperis the development of an “eStudio”, to facilitate effective course delivery andcooperative learning in both the BS and AAS programs.The
allow 24 hour laboratoryaccess to students in a Cisco CCNP curriculum. IT programs that are associated with theCisco Networking Academy Program may want to consider this type of implementationif student laboratory access is a recurring problem or if a larger number of students arecommuters. Overall, student feedback was very positive. More importantly, the numberof student complaints related to laboratory access was reduced to zero.If an institution considers, any type of distance learning extension, student ethics cannotbe overlooked. A system of checks & balances should be incorporated to insure thatstudents are actually performing assignments
distributed cognitive tasks involved in negotiating the course contentonline.Value of Digital Concept Maps to e-LearningToday, e-Learning opportunities often offer students very complex learning environmentsdelivered via a learning management system such as the open source Moodle,Desire2Learn, or Blackboard/WebCT. Furthermore, information and communicationstechnologies have advanced together enabling true resource-based learning. A resource-based learning environment (RBLE) is described as “an integrated set of strategies topromote student-centered learning in a mass education context, through a combination ofspecially designed learning resources and interactive media and technologies” 14. In acomplex RBLE, a student is offered interaction with books
to respond to the disaster. Most data and information have geographic elements, and many problems facing the world today are geographical in nature. For example, the complexity of climate change can best be understood when viewed from a geographical, multi-scale perspective of interconnected human/environment systems. The inherent geographical nature of various forms of data, information, and structure of problems has lead to numerous applications of GTs in scientific and engineering disciplines. As the barriers to the use and exploitation of GTs have been lowered, the application of GTs in practical problem solving has grown. For example, GTs are now an integral part of society’s approach in solving problems of emergency
AC 2009-1628: DO INTROVERTS PERFORM BETTER IN COMPUTERPROGRAMMING COURSES?Kyle Lutes, Purdue University Kyle Lutes is an Associate Professor for the Department of Computer & Information Technology (CIT) at Purdue University. Kyle joined the department in 1998 and is the chair of the department’s software development curriculum. His teaching and scholarly interests cover a broad range of software development areas including software applications for mobile devices, data-centered application development, and software entrepreneurialism. He has authored/co-authored numerous papers and two college textbooks on various software development-related topics. Prior to his current
curriculum development effortsonto the institutionally recognized reward system – typically published research and grants.The goals of this research project and report are more modest. They are to reliably evaluate some Page 15.1109.2current practices, using recognized educational theoretical bases so that the current situation canbe understood in an instructional design context and key indicators of the design process can beidentified and that methods of improvement can be based on a correct understanding of theinfluences at work in the process. A deeper understanding of what is happening will create afoundation upon which future designs or
Reform – Curriculum development based on Challenge- Based Instruction (CBI) in selected key courses. 3. Faculty Development – Faculty development seminars and workshops on CBI 4. STEM Pathways Growth and Support – Dual enrollment programs at STC.”17Recruitment and Retention Activity at Georgia Institute of TechnologyIn one insightful experiment conducted at Georgia Institute of Technology15, the computerscience department created an introductory course parallel to the traditional CS1 (a standarddesignator for the very first class in computer science) course that had at its core topical materialnaturally of interest to women: introduction to media computation. Coursework involved usingcomputers to manipulate and create media
the requirements of 30 credit hours of core courses common to allcomputer science students. The students continue taking core courses until the first semester oftheir junior year, when they begin taking their electives from different specialization areas.In this paper, the authors are proposing a new area of specialization in their computer sciencedepartment called Embedded Systems Engineering. The paper elaborates the detail content ofthe curriculum requirement for this track.Embedded Systems EngineeringThe area of Embedded Systems Design has been gaining a tremendous growth in recent years. Amajor aspect of this growth has been the addition of networking technologies and operatingsystems to embedded systems. Embedded systems have
been to provide a qualityprogram that meets accreditation standards while providing the students with a skill set thatallows them to succeed in computing careers. The curriculum content for the Computer Sciencedegree is based on the 2001 ACM Curriculum Report. The Computer Science degree at UVUwas accredited by Accreditation Board for Engineering and Technology (ABET) in 2002 andcurrently has more than 600 students. Students in this program take core courses until the firstsemester of their junior year, when they begin choosing their electives from differentspecialization areas.Capstone Design CoursesAccording to Computing Curriculum – Computer Engineering (CE2004)3, the culminatingdesign experience must be an integral part of the
, Firefox, and Apache.Because the objectives are curriculum dependent, it would be helpful to review thecurriculum within which our cryptography course evolved.Our Applied Cryptography ClassOur College is a small college within a large university. In addition to other goals, ourapplied security program is designed to prepare students to provide enterprise securityassessment and evaluation. Expected job titles for our graduates include securityinvestigator, manager, and auditor.The scope of the applied cryptography class includes cryptographic services required tosecurely store and transmit confidential information. It also includes relatedcryptographic services such as those that provide integrity, authentication, andnonrepudiation. Specific topic
. Scientific American, 2001. 285(2): p. 62-9.22. Montante, R., Beowulf and Linux: an integrated project course. Journal of Computing Sciences in Colleges, 2002. 17(6): p. 10-18.23. Hacker, T. and K.M. Madhavan. Developing a Research and Education Laboratory for High Performance Computing and Cyberinfrastucture. in Proceedings of the 2009 American Society for Engineering Education Conference. 2009. Austin, TX. .24. Membrey, P., et al., The definitive guide to CentOS, in The expert's voice in open source. 2009, Apress: Berkeley, Calif.25. Team, C., HOWTO: Create an OSCAR package, January 2004.26. Sloan, J., High Performance Linux Clusters with OSCAR, Rocks, OpenMosix, and MPI (Nutshell Handbooks). 2004: O'Reilly
) establish an interdisciplinary curriculum that provides world-class training in HPC systems at both the architectural and utilization level, and (2) utilizing the computational and information capabilities of HPC to support discovery research and development in Figure 1. The CIT High Performance bioinformatics, computer graphics, information security,Computing and Cyberinfrastructure Research nanotechnology, product design and manufacturing, Laboratory (HPC-CRL). computer science, physics, and Science, Technology