Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 5 results
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yung-Hsiang Lu, Purdue University; Thomas J. Hacker, Purdue University, West Lafayette; Carla B. Zoltowski, Purdue University, West Lafayette; Jan P. Allebach, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
) taking responsibilities on different components in the projects; (3) learning computertools for collaboration and integration; (4) developing leadership skills; (5) cultivating self-learning; and (6) improving communication, both speaking and writing. This paper reports oneproject that involves undergraduate, masters, and doctoral students. The project, now in its fifth-year, builds computer tools for researchers, educators, and students using cloud computing forlarge-scale image analysis. The project has received an award in a student competition, and threeresearch grants for international collaboration, entrepreneurship, and big data analytics, andproduced more than a dozen research papers. This paper describes the project in detail and
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Kristine Donate, Florida Atlantic University; Ravi T. Shankar, Florida Atlantic University; Diana Mitsova, Florida Atlantic University; Francis Xavier McAfee, Florida Atlantic University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
. Unfortunately, although we haveidentified an object within our data, it still has no meaning or relative definition for use by anapplication. We need to introduce a hierarchy of sorts and provide a manner in which multipleobjects may be identified as the same type, or class of object, yet each object is distinct from theother. Furthermore, we must define a meaning or relative association to our object.Once the individual aspects of the data have been identified, RDF is used to provide logic andmeaning through the use of RDF triples. Similar to the way we use English language withnouns, adverbs and verbs to construct a sentence to define who does what and how that action isdone, RDF triples state the relationship between bits of data. For example, let’s
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Justin L. Hess, Purdue University, West Lafayette; Lorraine G. Kisselburgh, Purdue University; Carla B. Zoltowski, Purdue University, West Lafayette; Andrew O. Brightman, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
behalf of women), all at Purdue University. This year she is a visiting research scientist in the Weldon School of Biomedical Engineering, visiting faculty in the Center for Entrepreneurship, and a visiting Fellow in the Center for Education and Research in Information Security at Purdue University.Dr. Carla B. Zoltowski, Purdue University, West Lafayette Carla B. Zoltowski, Ph.D., is Co-Director of the EPICS Program at Purdue University. She received her B.S. and M.S. in electrical engineering and Ph.D. in engineering education, all from Purdue University. She has served as a lecturer in Purdue’s School of Electrical and Computer Engineering. Dr. Zoltowski’s academic and research interests broadly include the
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Northwest Missouri State University; Eugene Vasserman, Kansas State University; Eleanor C Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
semester. Inspecting the values revealed that 4 resultshad a p-value below the 0.05 threshold as shown in Table 5. The one new statement is “Interest inwriting an algorithm that uses asymmetric encryption to authenticate a user.”Summary and Future WorkWe have developed a survey instrument that focuses on student interest and self-efficacy inrelation to jobs, classes and/or research involving cybersecurity. This survey was piloted duringthe Spring 2014 and Fall 2014 semesters. Pre-course survey results show that student interest wasgenerally higher than confidence. These differences were reduced, and in some cases reversed, inthe post-course survey data. Further analysis of the individual course results showed that there isa noticeable difference
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Abdulwaheed Johnson, Pace University; Anthony Joseph, Pace University
Tagged Divisions
Computing & Information Technology
digital signal processing, neural networks, and teaching and learning in higher education. Some recent applications include compression, modeling, and prediction in economics and finance, as well as speech recognition, globalization, entrepreneurship and innovation, and computing and engineering education with emphasis teams, teamwork, collaborative and team-based learning, and cooperative education. c American Society for Engineering Education, 2017 Mobile Payments and the End Users' Sensitivity to Information DisclosureAbstract: The adoption of electronic and mobile payments has improved significantly in recentyears. A number of payment channels that