Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 43 in total
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Cory Brozina, Virginia Tech; David B. Knight, Virginia Tech Department of Engineering Education
Tagged Divisions
Computing & Information Technology
Paper ID #9264Credentialing MOOCs: A Case StudyMr. S. Cory Brozina, Virginia Tech Cory Brozina is a PhD student in the Engineering Education department at Virginia Tech. His research is in educational technology and data analysis.Dr. David B Knight, Virginia Tech Department of Engineering Education David Knight is an Assistant Professor in the Department of Engineering Education and affiliate faculty with the Higher Education Program at Virginia Tech. His research focuses on student learning outcomes in undergraduate engineering, interdisciplinary teaching and learning, organizational change in colleges and universities
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
MD B. Sarder, University of Southern Mississippi
Tagged Divisions
Computing & Information Technology
, technology is not widely integrated into the learning experience. A recent surveyof ECAR shows that they wish that their professors more often use classroom technology inonline or face to face teaching (Figure 2).Figure 1: Students’ ownership of education related tech devices (a) and their importance rank to do with mobile devices (b) [2] Page 24.760.3 Figure 2: Student wished that their professors communicated more using these means [2]Classroom technology is both highly customizable and intrinsically motivating to students, it isparticularly well-suited to expand the learning experience [3]. Besides innovative
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Stephen J. Zilora, Rochester Institute of Technology (CAST); Jim Leone
Tagged Divisions
Computing & Information Technology
-446.4. DeMarco, T. 1982. Controlling software projects: management, measurement & estimation. Yourdon Press, New York, NY.5. Humphrey, W. S. (1988). Characterizing the software process: a maturity framework. Software, IEEE, 5, 2 (March/April, 1998), 73-79.6. Kaner, M., and Karni, R. 2004. A capability maturity model for knowledge-based decision-making. Information, Knowledge, Systems Management, 4, 4 (December, 2004), 225-252.7. Keller, K., and Mack, B. 2013. Maturity Profile Reports (March 2013). Retrieved May 17, 2013 from http://cmmiinstitute.com/assets/presentations/2013MarCMMI.pdf.8. Kitson, D., and Masters, S. 1992. Analysis of SEI Software Process Assessment Results 1987-1991, Technical Report
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Charles B. Owen, Michigan State University; Sarah Coburn, Michigan State University; Jordyn Castor
Tagged Divisions
Computing & Information Technology
an object-oriented system. Figure 1 - Example UML Class DiagramOf course, she could not see a UML diagram. Therefore, there were several major problems thathad to be overcome: a) helping her to understand what the diagrams normally convey visually, soshe can understand what the diagrams teach about program structure, b) providing a way torepresent a UML diagram that she could both read and produce, and c) providing a way for herto participate in the diagram assignments and, in particular, the peer review process.The natural idea for conveying UML diagrams was to convert them to raised-dot diagrams,where the structure is indicated by raised dots on paper and the textual elements are indicated inBraille. RCPD has a
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
figure is the block diagram of this homework.Homework : Design a binary to decimal convertor.1-Multiply bit #i by 2^i.2-Add all the results obtained from step 1.Following figure is the block diagram of this homework. Page 24.842.6These homework could be expanded for teaching the procedure for converting a number fromother bases such as octal or hexadecimal.(b)- LabVIEW in the Data Communications coursesLabVIEW could be used to enhance teaching communication courses. It is very helpful inexplaining many important topics such as: AM, FM, and PSK, and many other communicationtopics.Homework : Design AM modulation with LabVIEW. Use the following
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Osvaldo Mangual, Honeywell Aerospace; Marvi Teixeira, Polytechnic University of Puerto Rico; Reynaldo Lopez-Roig, Polytechnic University of Puerto Rico; Felix Javier Nevarez-Ayala, Polytechnic University of Puerto Rico
Tagged Divisions
Computing & Information Technology
Further examples can be found in the literature6,7. It is clear that each sub-convolution can beseparately processed, followed by a reconstruction stage to provide the final result. Parallelalgorithms can be developed by factorization of the Block Pseudocirculant matrix shown in (9),(12) and (13) into diagonal blocks. The general tensor product formulation for a block diagonalfactorization of the Block Pseudocirculant Matrix is6, y r = R r0 (A r0 ⊗ I N/r )D H (B r0 ⊗ I N/r )x r0 (15) 0 0 r0 0where xr0 and yr0 are the decimated-by-r0 input and output sequences and Ar0 and Br0 are thepost/pre-processing matrices, which are determined by each
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Kansas State University; Eugene Y. Vasserman, Kansas State University; Eleanor C. Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
of the Thirty-second SIGCSE Technical Symposium on Computer Science Education, SIGCSE ’01, pages 36–40, 2001. ISBN 1-58113-329-4.15 Steven P Miller, B Clifford Neuman, Jeffrey I Schiller, and Jermoe H Saltzer. Kerberos authentication and authorization system. In In Project Athena Technical Plan. Citeseer, 1987.16 Vennila Ramalingam and Susan Wiedenbeck. Development and validation of scores on a computer programming self-efficacy scale and group analyses of novice programmer self-efficacy. Journal of Educational Computing Research, 19(4):367–381, 1998.17 Dale C. Rowe, Barry M. Lunt, and Joseph J. Ekstrom. The role of cyber-security in information technology education. In Proceedings of the 2011 Conference on Information Technology
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Jimmy Faraon, National University
Tagged Divisions
Computing & Information Technology
Paper ID #9482Cloud Computing: Is it a way to go for academia?Prof. Mudasser Fraz Wyne, National University I have a Ph.D. in Computer Science, M.Sc. in Engineering, and B.Sc. in Electrical Engineering. In my capacity as Chair of the Department of Computer Science, Information and Media Systems at the Na- tional University of San Diego, I administer 4 graduate and 4 undergraduate programs. Furthermore, I manage 7 specializations, 2 certification programs, as well as the teaching and scholarship of 14 full-time faculty members (7 Full Professors, 4 Associate Professors, and 3 Assistant Professors) and more than 115
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jeremy Webb, Department of Mechanical and Biomedical Engineering Boise State University; Inanc Senocak, Boise State University; Dazhi Yang, Boise State University
Tagged Divisions
Computing & Information Technology
. Boston: Academic Press, 2011.3. Bird, Robert. B.; Stewart, Warren E.; Lightfoot, Edwin N. Transport Phenomena, 2 nd edition. New York:J. Wiley, 2002.4. Borgnakke, Claus; Sonntag, Richard E. Fundamentals of Thermodynamics, 7 th edition. J. Wiley, 2008.5. Çengel, Yunus A.; Boles, Michael A. Thermodynamics an Engineering Approach, 6 th edition. NewYork: McGraw-Hill, 2008.6. Çengel, Yunus A.; Cimbala, John M.; Turner, Robert H. Fundamentals of Thermal-Fluid Science,4thedition.New York: McGraw-Hill, 2012.7. Çengel, Yunus A.; Cimbala, John M. Fluid Mechanics: Fundamentals and Applications, 2 nd. McGraw-Hill, 20108. Çengel, Yunus A.; Cimbala, John M. Fluid Mechanics Fundamentals and Applications, 3 rd edition.McGraw-Hill, 2013.9. Chi, M.T.H. (2005
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Rob Elliott, Purdue University School of Engineering and Technology, Indiana University Purdue University at Indianapolis
Tagged Divisions
Computing & Information Technology
% 0.0% A B C D FFigure 13: Grade Distribution Between Flipped (n=27) and Non-Flipped (n=21) Course Sections Page 24.181.16Comparing the grade distribution of only summative assessments between the flipped and non-flipped courses might provide a more specific comparison, as shown in Figure 14. Flipped Classroom Non-Flipped Classroom 51.9% 52.4% 38.1% 25.9% 14.8% 7.4% 4.8
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
David M. Whittinghill, Purdue University, West Lafayette; Jacob Samuel Brown, Purdue University
Tagged Divisions
Computing & Information Technology
24.638.74. van den Berg-Emons, H. J. G., Saris, W. H. M., de Barbanson, D. C., Westerterp, K. R., Huson, A., & van Baak, M. A. (1995). Daily physical activity of schoolchildren with spastic diplegia and of healthy control subjects. The Journal of Pediatrics, 127(4), 578–584.5. Betker, A. L., Szturm, T., Moussavi, Z. K., & Nett, C. (2006). Video game–based exercises for balance rehabilitation: A single-subject design. Archives of Physical Medicine and Rehabilitation, 87(8), 1141– 1149.6. Bjornson, K. F., Belza, B., Kartin, D., Logsdon, R., & McLaughlin, J. F. (2007). Ambulatory physical activity performance in youth with cerebral palsy and youth who are developing typically. Physical Therapy, 87(3
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Kien A. Hua, University of Central Florida; Gholam Ali Shaykhian, NASA; Robert J Beil, NASA Engineering and Safety Center; KUTALMIS AKPINAR, School of Electrical Engineering and Computer Science, University of Central Florida; Kyle A. Martin, University of Central Florida
Tagged Divisions
Computing & Information Technology
locations and display similar locations. a) b) Figure 6: False detections of small landmarks on top of large landmarks. Although three main large landmarks are taken inside bounding boxes, many unnecessary small landmarks also appear inside large landmarks. a) Surface image, b) ROIs drawn on imageLRO imagery was retrieved from [18]. The multi-resolution Reduced Data Records (RDR) forthe LROC were downloaded as they provide preprocessed projected mosaics at relatively highresolution suitable for our study. An imagery pre-processor was developed, using GDAL andOpenCV, to construct image pyramids from the LRO imagery, suitable for display using WorldWind. Each tile in the pyramid is then
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Quan Do, New Mexico State University; Rajeev K. Agrawal, North Carolina A&T State University; Dhana Rao; Venkat N Gudivada, Marshall University
Tagged Divisions
Computing & Information Technology
] Chaitanya Mishra, Nick Koudas, and Calisto Zuzarte. Generating targeted queries for database testing. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, SIGMOD ’08, pages 499–510, New York, NY, USA, 2008. ACM.[16] R. Nielsen, J. Buckingham, G. Knoll, B. Marsh, and L. Palen. A taxonomy of questions for question generation. In Workshop on the Question Generation Shared Task and Evaluation Challenge, 2008.[17] Christopher Olston, Shubham Chopra, and Utkarsh Srivastava. Generating example data for dataflow programs. In Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD ’09, pages 245–256, New York, NY, USA, 2009. ACM.[18] Shiyan Ou, Constantin Orasan, Dalila
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Raymond A. Hansen, Purdue University; Tomasz Wiktor Wlodarczyk, University of Stavanger; Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
Paper ID #9550A collaborative, multinational cyberinfrastructure for big data analyticsProf. Raymond A Hansen, Purdue UniversityDr. Tomasz Wiktor Wlodarczyk, University of Stavanger Dr Tomasz Wiktor Wlodarczyk, is an Associate Professor at the Department of Electrical and Computer Engineering at University of Stavanger, Norway. His work focuses on analysis, storage and communica- tion in data intensive computing. His particular interest is time series storage and analysis. He is currently working on these areas in several research projects including: SEEDS (EU FP7), Safer@Home (RCN), A4Cloud (EU FP7), BigDataCom-PU
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy
Tagged Divisions
Computing & Information Technology
Paper ID #10639Wireless Sensor Networks Projects in a Computer Engineering ProgramDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. She received her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science Department at Utah Valley University, Orem
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Daniel Raviv, Florida Atlantic University; Yumi Kahori Nakagawa; George Roskovich, Florida Atlantic University
Tagged Divisions
Computing & Information Technology
Paper ID #9362A Visual and Engaging Approach to Learning Computer AlgorithmsDr. Daniel Raviv, Florida Atlantic UniversityYumi Kahori NakagawaMr. George Roskovich Page 24.126.1 c American Society for Engineering Education, 2014 A Visual and Engaging Approach to Learning Computer Algorithms Daniel Raviv, George Roskovich and Yumi Nakagawa Department of Computer & Electrical Engineering and Computer Science Florida Atlantic University Boca
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Scott A. Kuhl, Michigan Technological University; Robert Pastel, Michigan Technological University; Ryan George, Michigan Technological University; Chad M. Meyers, Michigan Technological University; Matthew L. Freitag, Michigan Technological University; Jacob M. Lund, Michigan Technological University; Michael Paul Stefaniak
Tagged Divisions
Computing & Information Technology
Fall2012. Since Spring 2011, the course has regularly had a higher proportion of women enrolledthan the overall CS department. Even when projects are not successful, HGD gives studentsvaluable experience working on large projects and to exercise management and leadership skillsthrough experiential learning. We have also provided useful guidelines and suggestions to helpother colleges and universities replicate the success of HGD.References1 Briana B. Morrison and Jon A. Preston. Engagement: Gaming throughout the curriculum. In Proceedings of the 40th ACM Technical Symposium on Computer Science Education, SIGCSE ’09, pages 342–346, New York, NY, USA, 2009. ACM.2 Yolanda Rankin, Amy Gooch, and Bruce Gooch. The impact of game design on
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, NASA; Mohd A. Khairi, Najran University
Tagged Divisions
Computing & Information Technology
Paper ID #8737CENTRALIZED OR FEDERATED DATA MANAGEMENT MODELS, ITPROFESSIONALS’ PREFERENCESDr. Gholam Ali Shaykhian, NASA Ali Shaykhian has received a Master of Science (M.S.) degree in Computer Systems from University of Central Florida and a second M.S. degree in Operations Research from the same university and has earned a Ph.D. in Operations Research from Florida Institute of Technology. His research interests include knowledge management, data mining, object-oriented methodologies, design patterns, software safety, genetic and optimization algorithms and data mining. Dr. Shaykhian is a professional member of the
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Ge Jin, Purdue University Calumet (College of Technology); Gerald A. Dekker Jr., Purdue University Calumet; John Moreland, Purdue University Calumet; Barbara Jean Nicolai, Purdue University Calumet
Tagged Divisions
Computing & Information Technology
Paper ID #8720Information Technology for Communities: Development of a Web-based 3DVisualization and Cluster Computing System for Disaster ManagementDr. Ge Jin, Purdue University Calumet (College of Technology) Ge Jin, D.Sc, is currently an assistant professor in the Department of Computer Information Technology and Graphics at the Purdue University Calumet. He teaches computer game development, computer graphics and animation, as well as computer information technology courses at the undergraduate and graduate levels. Prior to joining Purdue University Calumet, he was a postdoctoral research scientist at the George
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Usman Ghani, DeVry University; Ahmed S. Khan, DeVry University, DuPage
Tagged Divisions
Computing & Information Technology
Paper ID #8523The Effect of Feedback Mechanisms on Students’ Learning in the Use ofSimulation-based IT Training in a Computer Networking ProgramDr. Usman Ghani, DeVry University Usman Ghani Senior Professor DeVry University College of Engineering and Information Science Usman Ghani is a senior professor of Network and Communication Management in the College of En- gineering and Information Science at DeVry University, Addison, Illinois. Professor Ghani’s area of specialization is ’Network Infrastructure and Security’. Mr. Ghani began his career as an Electronics Engineer for Johnson Controls, Inc. in Milwaukee, Wisconsin
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Namratha Siripragada, Northern Illinois University
Tagged Divisions
Computing & Information Technology
block diagram of the systemis shown in Figure 1. This is composed of a) Experiment bank; b) Switching mechanism; c)Interfacing between the system and the experiment bank; d) Graphical user interface (GUI); e)Access control and user management; and f) Web application for system monitoring. Figure 1: Overall block diagram of the developed system.Experiments and InterfacingThe Experiment bank consists of all the developed experiments and is connected to the HostComputer via a switching mechanism. The switching mechanism allows one to reconfigure thehardware connection to form different experiment setups.The developed experiments deal with both the analog and digital signals. An I/O card fromNational Instruments (NI) is
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Norman Pestaina, Florida International University; Tiana Solis, Florida International University; Peter J. Clarke, Florida International Univeristy
Tagged Divisions
Computing & Information Technology
Objectivesevolve. To complete the program of study for the BS-CS, every student will a) Demonstrate proficiency in the foundation areas of Computer Science including discrete structures, logic and the theory of algorithms. b) Demonstrate proficiency in various areas of Computer Science including data structures and algorithms, concepts of programming languages and computer systems. c) Demonstrate proficiency in problem solving and application of software engineering techniques. d) Demonstrate mastery of at least one modern programming language and proficiency in at least one other. e) Demonstrate understanding of the social and ethical concerns of the practicing computer scientist. f) Demonstrate the ability to work cooperatively in teams. g
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Francis Giraldeau, Polytechnique Montreal; Michel R. Dagenais, Ecole Polytechnique de Montreal; Hanifa Boucheneb, École Polytechnique de Montréal
Tagged Divisions
Computing & Information Technology
fairness, is given inFigure 6. We observe in a) that a mutex may be unfair if the lock is obtained just after beingreleased, while chained semaphores in b) produce a pattern that resembles a checkerboard.However, if the critical section is short and frequent, a simple mutex is much faster on av-erage than the perfect fairness achieved with chained semaphores, where a context switch isforced at each cycle. Understanding the fine differences between lock types, clearly exposedby looking at their detailed behavior, would be hard to achieve without tracing. (a) Blocking mutex (b) Spinlock running in userspace Figure 5: Difference between mutex and spinlockThe
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manghui Tu, Purdue University Calumet; Kimberly Lynn Spoa-Harty, Purdue University Calumet Graduate Student
Tagged Divisions
Computing & Information Technology
ate upd rds A hea ccess processing nd n g a reco lth ing Data s i e car & es car e B upd Acc ealth
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona; Mohammad Rafiq Muqri, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
://www.digikey.com3. D. Vyas, “Microcontrollers: options and trends in today's market,” in ACM Proceedings International Conference and Workshop on Emerging Trends in Technology, Mumbai, India, 2010, pp. 1019-1019.4. D’Souza, J., Reed, A., & Adams, K. (2014). Selecting Microcontrollers and Development Tools for Undergraduate Engineering Capstone Projects. Computers in Education, 24(1), (In press)5. M. Slade, M. H. Jones, and J. B. Scott, “Choosing the right microcontroller: A comparison of 8-bit Atmel, Microchip and Freescale MCUs,” Faculty of Engineering, The University of Waikato, Hamilton, New Zealand, Tech Rep. http://hdl.handle.net/10289/5938 , Nov. 2011.6. Daniel Cross-Cole, ‘ECET 365 Course Overview’ document, DeVry University, available
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Seyed Mousavinezhad, Idaho State University; R. Eugene Stuffle, Idaho State University; Wei Pan, Idaho State University; Steven Grant Maclure, Idaho State University
Tagged Divisions
Computing & Information Technology
example,design different filters based on their pole/zero location, an obvious characteristic evidentin the frequency domain.Example 2. Similar to Example 1 but with zero initial conditions (ZIC):6y[n] – 5y[n-1] + y[n-2] = 6x[n] , x[n] = (2)n u[n] , y[-1] = y[-2] = 0y[n] = yh[n] + yp[n] = C1(0.5)n + C2(1/3)n + C3(2)n = -(0.5)n + 0.4(1/3)n + 1.6(2)n, n ≥ 0.H(z) = Y(z)/X(z) = 6z2/(6z2 -5z +1), Y(z) = X(z)H(z) = z3/[(z - 0.5)(z - 1/3)(z - 2)].At the same time students can use MATLAB solution to compare it to the analyticalformulation presented above.>> n=0:1:10; B=[1]; A=[1, -5/6, 1/6]; x=2.^n; y=filter(B,A,x)y = 1.0e+003 * Columns 1 through 10 0.0010 0.0028 0.0062 0.0127 0.02550.0512 0.1024 0.2048
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Janusz Zalewski, Florida Gulf Coast University; Andrew J. Kornecki, Embry-Riddle Aeronautical Univ., Daytona Beach; Bogdan Denny Czejdo, Fayetteville State University; Fernando Garcia Gonzalez, Florida Gulf Coast University; Nary Subramanian, University of Texas, Tyler; Dawid Trawczynski, Advanced Micro Devices
Tagged Divisions
Computing & Information Technology
be put in place. This could be considered a combination of message encryption and authentication. For the Student Activities component of each module, there are two basic required partswhose completion assures that the respective knowledge is acquired: (a) Required Reading and(b) Hands-on Exercise. In case of Java Security module, the Required Reading involved theessential mandatory reading from the source “Java Security Overview” white paper,9 and anoptional reading material from a selection of Java security books, determined primarily by theiravailability in the school library.10-12 The reading was accompanied by a specially developed Hands-on Exercise, which involvedfollowing the actual code to replicate the security violation
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Afsaneh Minaie, Utah Valley University; Ruhul H. Kuddus, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai
Tagged Divisions
Computing & Information Technology
sequences.ImplementationA multiway lexicographic search tree can be used to represent a sequence where an eventfrom the sequence of events determines a multiway branch at each step. If the sequence isconstructed from the English alphabets, at the root of the tree there are 26 possiblebranches followed by another branch according to the next letter in the sequence.The tree shown in Fig. 16 represents sequences constructed from letters a, b, and c. Page 24.1079.3 Fig. 1. A multiway lexicographic search tree constructed using the English letters.At the root of the tree, there are three branches one for each of the letters a, b, and c. Atthe next level there are
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Brian Joseph Lane
Tagged Divisions
Computing & Information Technology
, February 2003, http://pj.freefaculty.org/ps905/ObjC.pdf5. Altenberg, B., Clarke, A., Mougin, P., Become an Xcoder : Start Programming the Mac Using Objective-C, CocoaLab, 2008, http://www.e-booksdirectory.com/details.php?ebook=38326. Kochan, S. G., Programming in Objective-C, Addison-Wesley, August 2011.7. Cocoa Developers Guide, Apple Developer Publications, December 2010, http://itunes.apple.com/us/book/cocoa-fundamentals- guide/id409921412?mt=118. Deitel, H.M., Deitel, P.J., Java How to program, Prentice Hall, 2003 Page 24.234.12Appendix A: Bluetooth Project Class Definitions and Pairing MethodsIOBluetoothAn
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Vamshi Krishna Bolly, Purdue University; John Springer, Purdue University, West Lafayette, IN, USA; J. Eric Dietz, Purdue University
Tagged Divisions
Computing & Information Technology
. Rixner, and A.L. Cox. “The Hadoop distributed filesystem: Balancing portability and performance,” in Performance Analysis of Systems & Software (ISPASS), 2010 IEEE International Symposium, on pages 122-133, IEEE, 2010.7. G. Attebury, A. Baranovski, K. Bloom, B. Bockelman, D. Kcira, J. Letts, T. Levshina, C. Lundestedt, T. Martin, W. Maier, H. Pi, A. Rana, I. Sfiligoi, A. Sim, M. Thomas, and F. Wuerthwein. “Hadoop Distributed File System for the grid,” in Nuclear Science Symposium Conference Record (NSS/MIC), 2009 IEEE, on pages 1056-1061. IEEE, October, 2009.8. R. P. Padhy. “Big Data Processing with Hadoop-MapReduce in Cloud Systems,” in International Journal of Cloud Computing and Services Science (IJ