Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 78 in total
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
executed. The typical application for the last two combinations are intelligent I/O devices.6. Control Programming in JavaJava RTS 2.0 was the first Java RTS product 17 release to include a real-time garbage collector(RTGC) that includes an enhanced version of an innovative real-time GC algorithm that providesthe Java developers very fine-grained control over dynamic memory management in a real-timeenvironment. The important point about the RTGC provided with Java RTS is that it is fullyconcurrent, and it can thus be preempted at any time. There is no need to run the RTGC at thehighest priority, and there is no stop-the-world phase, during which all the application's threadsare suspended during GC.With some diligent care and guidance from
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Frank Jordan Sheen, Brigham Young University; Dale C. Rowe Ph.D., Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
/ICS topics.Current CurriculumCurrent curriculum in higher education seems to indirectly address critical infrastructure securityconcepts. Engineering disciplines discuss buffer overflows, information systems programsdiscuss the business impact of security issues, and IT programs cover cyber security challengesin systems. There are a few reasons why direct exposure to SCADA security topics has beenlimited.One of the reasons deals with integrating effective examples into coursework. In 2009,researchers from Ege University in Turkey discussed the problems in introducing students toSCADA systems, and noted that SCADA equipment can be difficult to use for students, partlybecause it is difficult to replicate real-world environments in a lab. They
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona; Sogand Kavianpour; Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
system control. PI controllers are fairly common. A derivative action issensitive to measurement noise, whereas the absence of an integral term mayprevent the system from reaching its target value.In this paper, the result of the PID controllers in the student projects such as roboticcar and robotic arm, will be analyzed. The results are based on the application ofproportional, integral, and derivative control. In addition, a MATLAB and C++programs will be used to calculate PID values.This paper suggests one possible method to implement the concepts that studentshave learned in the other courses, and use them in the real world applications.Robotic car and Robotic arm are two examples of the projects implemented in oneof the courses in the
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Kristine Donate, Florida Atlantic University; Ravi T. Shankar, Florida Atlantic University; Diana Mitsova, Florida Atlantic University; Francis Xavier McAfee, Florida Atlantic University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Paper ID #12707Searching the World Wide Web – Finding the Right Information the FirstTimeMs. Kristine Donate, Florida Atlantic University Twenty years in the RF Analog/Mixed Signal Design and EDA software industries doing design, customer support, application engineering, technical writing, training development and delivery, project manage- ment, AE and business management. Current focus is on telephony and IVR technologies. Realization of software development as a true passion of mine led to the pursuit of a Master’s degree in Computer Science at Florida Atlantic University, graduated in December, 2013.Dr. Ravi T
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
more effective fall detection prevention or monitoring of many long-termchronic diseases.20Collection of Long-Term Databases of Clinical DataSensors link the physical with digital world by capturing and revealing real-world phenomenaand converting these into a form that can be processed, stored, and acted upon. The data that isgathered by the sensors in a WMSN can be used in two ways20: 1. Healthcare applications that leverage wireless sensor networks analyze the data gathered by sensors to infer and make decisions about the state of a patient’s health and wellbeing. By improvement in monitoring consistency, continuous monitoring enhances data quality and precision for decision support leading to better titration of
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Forough Sheikh-Ansari, Purdue University; Baijian Yang, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
the authenticity of the VM templates and how do we protect VM templates from beingmanipulated? If cryptophytic approach is applied, how long will it take to authenticate VMtemplates? This article studied related work and proposed a cryptography based solution toauthenticate VM templates. Real virtual machine templates of different sizes were used tomeasure the performance of different approaches. The results show that a PKI-like strongauthentication approach is not unacceptable to be used in real cloud computing environment.This study is derived from a security course project. Students learned the basics of cryptographyand began to apply their knowledge in a real world setting. The study provides insights andbenefits for both the cloud
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Briana Lowe Wellman, University of the District of Columbia; Tommy Suriel, University of The District of Columbia; Evanna Maria Reynoso
Tagged Divisions
Computing & Information Technology
MobileRobots’ Advanced Robot Interface for Applications (ARIA)20 , a C++ library SDK for MobileRobots platforms, on a Quad Core 3.2 GHz machine runningLinux with 6GB of RAM. MobileSim, software for simulating MobileRobots platforms was usedfor simulations. The real robots communicated using a standard wireless IEEE802.11b network.The same code and machine were used for both simulations and real world experiments.As mentioned in the approach, robots performed exploration using a frontier-based algorithm inwhich robots use their sonar sensors to detect the environment. The approaches tested includeddirect communications (continuous communications between robots) and Sector Search withRendezvous. Three trials were conducted for each approach.ResultsTwo
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
from the target system—often radically different. 3. The system includes sensors and actuators that are a significant (or exclusive) means of communicating between the system and the outside world. 4. The system requires non-traditional Human-Computer Interaction (HCI) design since there is often no keyboard, screen or mouse. 5. The system includes real-time aspects. 6. Power consumption is often an important design issue as embedded systems are often mobile or isolated from power sources.Note that many embedded systems will fit some but not all of the above characteristicsThe Design Process and problems in embedded system designA few comments on each of the above characteristics will illustrate some of the design
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Francis N Mensah, College of Engineering and Technology, Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
the samevulnerabilities as conventional computer systems in addition to those peculiar to their physicalinteraction with the world. In this section, some of the key factors that affect the securityrequirements of cyber physical systems are discussed 4.Real-Time Requirements: Cyber Physical Systems are usually used in applications where theneeds for real-time responses are not negotiable. Any form of delay or jitter in real-time systemsis definitely unacceptable. With this constraint a concern is immediately raised when securitymeasures like encryption and authentication must be implemented. These measures come withsome overhead that can have an adverse effect on the performance of real time systems. It is thusimportant to take into account
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
the area of computing. These courses normally involveinterfacing computers with sensors and transducers. At Brigham Young University we felt itimportant to offer a class that would allow IT students to participate in the growing area of theIoT. Thus the mechatronics class, which is specifically targeted at IT students, links the world ofmechanical devices, electronics and computers with the IT world of systems design, networking,security, HCI and many other IT topics. In this class a variety of experiments involve computingand real-world interactions at varying levels of complexity.Common ProblemsAll these applications share some common problems in the context of an IT learning experience.The primary problem is the reality that IT students
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Paymon Sanati-Mehrizy, University of Pennsylvania; Ali Sanati-Mehrizy, Pennsylvania State University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
intends on attending Medical School.Ali Sanati-Mehrizy, Pennsylvania State University Ali Sanati-Mehrizy is a medical student at the Milton S. Hershey Medical Center at Pennsylvania State University. His research interests include the application of mobile computing in the sciences. Upon completion of medical school, he hopes to pursue a career in Internal Medicine/Pediatrics with a further specialization in Hematology-Oncology.Dr. Reza Sanati-Mehrizy, Utah Valley University Page 22.926.1 c American Society for Engineering Education, 2011 Integration of Mobile Computing into
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
Educators face many challenges when incorporating engaging elements into theircomputing courses. One approach is to leverage emerging paradigms that draw interest not onlyfrom their novelty but their relevance to daily life. Augmented Reality (AR) is a nascent field ofcomputing in which virtual artifacts are embedded into the physical world in real time, providingusers with new ways to visualize and interact within their environment. Further, it contains manyelements that have been shown to be engaging in the classroom, such as mobile devices, 3Dmedia, graphics and image processing. Students are often curious about how such technology isdeveloped, yet in years past, there were significant barriers to creating even simple AR systems.Technological
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Te-shun Chou, East Carolina University; Steve Keith Baker, East Carolina University; Miguel Vega-Herrera
Tagged Divisions
Computing & Information Technology
interests include networking and security. I also enjoy teaching emerging technology classes and working with the Internet of Things. My background includes twenty years of IT experience with both the private and public sectors. I try to bring real-world examples into my classroom, and provide students with a well-rounded view of expectations in the workforce.Miguel Vega-Herrera c American Society for Engineering Education, 2016A Comparison of Network Simulation and Emulation Virtualization ToolsAbstractPacket Tracer (PT) is an official Cisco software simulator for exercising Cisco networkequipment. Graphical Network Simulator (GNS3) is a free emulator software which allowsrunning actual networking software
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University; Scott Pack
Tagged Divisions
Computing & Information Technology
-larger portions of the overallcomputing market.A new combined class and lab experience has been designed for first-year IT students tointroduce them to CPS concepts, with an emphasis on IT aspects of the field. This combinedexperience is taught as a single module, in a few hours, within a first year IT course. Two ideaswere addressed by the experience. Firstly that CPS systems differ significantly fromconventional computer systems and secondly that there are important design issues relating thesesystems to core IT topics. Lists of CPS concepts were developed and a subset of the conceptswas included in the paired class-and-lab experience for the students. The lab experience uses amicrocontroller system that interacts with the real world using
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
1451 standards and discusshow to create WSNs and intelligent interactive devices, and interface with smart sensors andtransducers. Moreover, the WirelessHART(Highway Addressable Remote Transducer), IEEE1451, ZigBee / 802.15.4, and 6LoWPAN standards will be explained. Networking actuators andsmart sensors and real-world technical challenges will also be highlighted.Advances in computing and instrumentation have sparked the need of engineering technologygraduates who can update and improve manufacturing facilities and product design. This paper isan attempt to expose engineering technology students earlier to WSNs and other emergingtechnologies in lieu of taking WSN track in their technology curriculum.1. IntroductionThe field of wireless
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
new tool that has a good potential to optimize theparameters of the intelligent systems. Classical AI was incompetent to serve the increasingdemand of search, optimization and machine learning in information systems with largebiological and commercial databases and factory automations for steel, aerospace, power, andpharmaceutical industries2. The failure of the traditional AI opened up new avenues for thenon-conventional models in various engineering applications. These new computational toolsgave rise to a new discipline called computational intelligence1. CI could be defined as Nature-inspired method (s) + real-world (training) data = Computational intelligence5.The IEEE Neural Network Society changed its name in 2004 to IEEE
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Connie Justice, Indiana University-Purdue University, Indianapolis; Rushabh Vyas, Indiana University-Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
. Professor Justice is a Certified Information Systems Security Professional, CISSP. She created the networking option and security option for CIT majors and a Network Security Certificate Program. She has also designed and modified many courses in networking and networking security. Professor Justice is noted for her creation of the Living Lab, an experiential learning environment where students gain real world experience running an IT business. Dr. Justice takes extreme pride and is a great innovator in the area of experiential learning and service. Experiential learning and service contributes to the integration of theory and application by creating an environment where the students learn by doing or apply their theory
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Barbara E. Brazon, Penn State University; Mary Lynn Brannon, Pennsylvania State University, University Park
Tagged Divisions
Computing & Information Technology
AC 2011-1124: USING A TEAM-BASED SERVICE LEARNING PROJECTTO SUPPORT TO COMMUNITY BUSINESS IN A PROJECT MANAGE-MENT COURSEBarbara E. Brazon, Penn State University Barbara E. Brazon is a Coordinator and Senior Instructor in the Information, Sciences and Technology program at Penn State University, Hazleton. She holds a Master of Science Degree in Instructional Technology from Bloomsburg University. She conducts l research o student-centered pedagogical approaches used in problem based learning. Her key areas of focus are working with students in a complex, multifaceted, team environment, accessing how the acquisition of new information and skill sets leads to resolution of real world problems. She concentrates her
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Brian R. King, Bucknell University; Ashwin Satyanarayana, New York City College of Technology
Tagged Divisions
Computing & Information Technology
Probability with applications in Real World Learning Problems. Address: Department of Computer Systems Technology, N-913, 300 Jay Street, Brooklyn, NY-11201. Page 23.1140.1 c American Society for Engineering Education, 2013 Teaching Data Mining in the Era of Big DataAbstractThe amount of data being generated and stored is growing exponentially, owed in part to thecontinuing advances in computer technology. These data present tremendous opportunities indata mining, a burgeoning field in computer science that focuses on the development of methodsthat can extract knowledge from data
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mahmoud K. Quweider, University of Texas - Rio Grande Valley; Fitratullah Khan, University of Texas - Rio Grande Valley
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
course major module objectives and module sub-objectives, in particular, those that are relevant to CBI implementation. 2. Identifying expected difficulties: What are the difficulties that students face when taking the course? 3. Real-world context: Why is the course an important part of the CS curriculum, and where can one find its applications? 4. Knowledge model: What is the conceptual model for the course, including prerequisites, course dependencies, and course level? What concepts and techniques should be considered to enhance understanding of the material? 5. Assessment of learning: How does one change the traditional testing and assessment methods to make sure these include formative assessment
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Danai Chasaki, Villanova University
Tagged Divisions
Computing & Information Technology
students in this major is critical. The Computingfield offers a unique opportunity for exciting industry-sponsored mini-projects that involvehands-on experience and link the applicability of computing skills to the industry world.Technical understanding is essential to engineering. But engineers find success and personalfulfillment when they couple these skills with a mindset to create extraordinary value for others.Our mini-project aims at providing an immersive experiential learning experience that introducesstudents to engineering entrepreneurial-minded principles[1] (EML). In this paper, we discuss the design of a seven week long lab offered in the beginning ofthe freshman year, where students get real world experience on cyber
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Hassan Rajaei, Bowling Green State University; Eman A. Aldakheel, Bowling Green State University
Tagged Divisions
Computing & Information Technology
 Improving Learning process at Different Educational  Levels”, Procedia Social and Behavioral Sciences, 2, pp. 5641­5645 30.  Pocatilu, P.,  Alecu, F. & Vetrici, M. (2009), “Using Cloud Computing for E­learning Systems”, Proceeding  Proceedings of the 8th WSEAS international conference on Data networks, communications, computers, ACM,  World Scientific and Engineering Academy and Society (WSEAS) Stevens Point, Wisconsin, USA. 31.  CS2008 Taskforce, (2008), “Computer Science Curriculum 2008”, ACM / IEEE taskforce,  www.acm.org/education/curricula/ComputerScience2008.pdf 32.  Krook, D. (2011), “Create a PHP development environment on the Cloud, Learn how to use the IBM Cloud to  build and test your PHP applications”, Copyright
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Secil Caskurlu, Purdue University; Iryna Ashby, Purdue University; Marisa Exter, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
instructional designers’ beliefs about design character. These studies have highlighted the importance of cross-disciplinary skills and student engagement in large-scale, real-world projects. Dr. Exter currently leads an effort to evaluate a new multidisciplinary degree program which provides both liberal arts and technical content through competency-based experiential learning. c American Society for Engineering Education, 2017Running Head: FORMAL EDUCATION AND COMPUTING PROFESSIONALS’ NEEDS The Alignment between Formal Education and Software Design Professionals’ Needs in Industry: Faculty Perception Secil Caskurlu, Iryna Ashby, & Marisa Exter
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Brian Patrick, Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
size of the screen for everydevice. The larger screen size devices (desktop and laptop) allowed for the entire email as well as thetyping area to be seen simultaneously. However, the smaller screen size devices (tablet and smartphone)meant that the questions were not visible while typing due to the lack of screen real-estate.10.1.2 Music TaskCategory: EntertainmentTask: Streaming MusicApplication: SpotifyMetrics of Performance: TimeExplanation: The user will find three playlists in a specified genre and number of followers (the playlistshould be different for each platform). They will be measured on how long it takes them to identify thethree playlists and select one song from each playlist. The Spotify application allows users to
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Connie Justice, Indiana University Purdue University, Indianapolis; Nichole McFarland, Indiana University Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
Systems Security Professional, CISSP. She created the networking option and security option for CIT majors and a Network Security Certificate Program. She has also designed and modified many courses in networking and networking security. Professor Justice is noted for her creation of the Living Lab, an experiential learning environment where students gain real world experience running an IT business. Dr. Justice takes extreme pride and is a great innovator in the area of experiential learning and service. Experiential learning and service contributes to the integration of theory and application by creating an environment where the students learn by doing or apply their theory in service learning projects, practica
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Raymond A. Hansen, Purdue University; Tomasz Wiktor Wlodarczyk, University of Stavanger; Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
time. However, wechose only a single category for each book in order to provide basic classification, but differentcategorizations could also be argued. Big Data Books The text Big Data [10] is a work-in-progress that focuses on real-time Big Data systems. It present a general architecture for hybrid approaches based on real-life applications. The text Mining of Massive Datasets [9] is used for the CS345A course at Stanford University. It offers a more theoretical background than other available books. It focuses on a set of algorithms for a few key problems in data mining e.g. link analysis or clustering. Understanding Big Data [11] provides a general overview of the Big Data landscape from IBM’s perspective. This bias is
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Michael Tamir; Ronald S Harichandran P.E., University of New Haven; Lueny Morell, InnovaHiEd
Tagged Divisions
Computing & Information Technology
learning resources and modes), employer-relevant and practical (project- based learning) than traditional engineering programs at a lower price point. 7. Employing faculty who are a smart blend of engineers + educators, who explore innovative teaching, and are mentors.The GalvanizeU/UNH Academic Model and Pedagogy GalvanizeU/UNH’s program places hands-on, collaborative, project-based learning at thecenter of education. Emphasizing real world experience, communication, leadership andentrepreneurship, it offers a diverse body of students the opportunity to experience data scienceas an engaging and collaborative profession, pairing technical training with 21st centuryprofessional skills. A priority goal of GalvanizeU/UNH is to
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
MD B. Sarder, University of Southern Mississippi
Tagged Divisions
Computing & Information Technology
to provide the mentoring service to their fellow faculty.Innovation and Uniqueness of our Approachi. Real Time Communication with StudentsAn online instructor must be able to compensate for the lack of a physical presence by creating asupportive environment in the Virtual Classroom where all students feel comfortableparticipating. Professors at our institution use as many interfaces as possible to provide flexibilityand accommodate individual needs. They use almost all Blackboard functions such asdiscussions, chat, assignments, mail, assignment drop box, selective release, podcast, vodcast, e-board, web access, breakout rooms, application share, tracking, etc. along with emails, telephonecalls, and meetings to manage online courses. For
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Naser El-Bathy P.E., North Carolina A&T State University; Clay Samuel Gloster Jr., North Carolina A&T State University; Ghassan M. Azar; Cameron Seay, North Carolina A&T State Univeristy; Mohammed K. El-Bathy, Lawrence Technological University; Ibraheem A. Kateeb, North Carolina A&T State University; Rajeev K. Agrawal, North Carolina A&T State University; Aiman Ghassan Baset
Tagged Divisions
Computing & Information Technology
technologiessuch as: Business Process Execution Language, Java Server Faces (JSF), Web Services, SOAP,WSDL, UDDI, APIs and XML. In this course, we use major platforms for web application andweb services development such as Oracle Server Application (OSA) and Java EE Applicationserver, along with IDEs such as JDeveloper. All background material related to HTML, XML,JavaScript, Java SE/EE, and client/server architecture are developed within the course itself fromscratch. The course is for students who prefer hands on experience of advanced IT Applicationsand research methodologies and like the thought of using real tools. It is also for students whowant to be graded based on what they can do as well as what they know and the students who areinterested in
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Duke Mejia Bulanon, Northwest Nazarene University; Stephen A. Parke P.E., Northwest Nazarene University
Tagged Divisions
Computing & Information Technology
researchers have demonstrated that immersing students in research-basedactivities expanded their learning opportunities. For example, Ferry and Otieno11 introduced theconcept of automation integration by using machine vision for an automated bottle and cappingand sorting system. Likewise, Yeh and Hammond12 developed an industry-based student projectwhich used machine vision to guide a robot that picks-up a tire from a conveyor and places it inanother fixture. By giving the students the chance to perform real-world problems, the studentsacquire techniques on MVS development and learn how to integrate it with other automationsystems. It allows the students to think “outside the box”. In the case of crop monitoring, theoutput will be used to manage crop