Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 38 in total
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2010 Annual Conference & Exposition
Authors
Thomas Hacker, Purdue University, West Lafayette
Tagged Divisions
Information Systems
engineering. 2000: IEEE Computer Society Press; 1998.16. McKusick, M., et al., A fast file system for UNIX. ACM Transactions on Computer Systems (TOCS), 1984. 2(3): p. 181-197.17. Kleiman, S. Vnodes: An architecture for multiple file system types in Sun UNIX. 1986: Citeseer.18. Schroeder, B. and G. Gibson. Disk failures in the real world: What does an MTTF of 1,000,000 hours mean to you. 2007.19. Hey, T. and A. Trefethen, The Data Deluge: Grid Computing - Making the Global Infrastructure a Reality. 2003: John Wiley & Sons.20. Wang, F., et al. File system workload analysis for large scale scientific computing applications. 2004: Citeseer.21. Hargrove, W., F. Hoffman, and T. Sterling, The do-it-yourself supercomputer
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ronald Glotzbach, Purdue University; Nathan Bingham, Purdue University; Meiqi Ren, Purdue University; Dorina Mordkovich, Purdue University
Tagged Divisions
Information Systems
-Stadium couldeasily translate into other communication areas where a mix of real-time and stored informationwould enhance an information space or an experience. The e-Stadium application (see Figure 1) is written in ASP.NET using C# with a SQL Server relational database. The adaptive rendering capabilities of ASP.NET Mobile Forms, which supports over 200 different handheld devices from a single application, are used to deliver content to handheld devices. As a game progresses, statisticians generate an XML document containing individual plays, statistics, drive
Conference Session
IT-based Instructional Technologies
Collection
2009 Annual Conference & Exposition
Authors
Mysore Narayanan, Miami University
Tagged Divisions
Information Systems
instructional technologies, providesguidance and solutions in visual and instructional design, expands instructionaltechnology research, and builds partnerships locally and globally.(http://telr.osu.edu/) Page 14.263.4 Utilizing real-world problems as a stimulus for student learning is not at all new and has been in practice for a very long time. Problem-based learning has been defined as minds-on, hands-on, focused, experiential learning. (Wilkerson & Gijselaers, 1996). A problem-based curriculum is significantly different from the traditional discipline centered curriculum. (Woods, 1994). Instructors are considered to serve as problem-solving
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Okechi Egekwu, James Madison University
Tagged Divisions
Information Systems
-driven approaches, RFID networks will allowenterprises to build event-driven applications that will react to real-time information that are thenused to make intelligent business decisions. Managing the data from RFID tags and readers stillremains one of the major challenges that impede the diffusion of this technology. Buildingscalable and secure data and information infrastructure are among the problems identified byearly adopters. This paper will present an overview of industry (individual companies andpartnerships) and government activities aimed at solutions for a robust RFID infrastructure. Thispaper will also discuss efforts at the Integrated Science and Technology (ISAT) program atJames Madison University to expose students to the various
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Julie Mariga, Purdue University
Tagged Divisions
Information Systems
real world. InformationWeek, December 18/25, 2006, pp.39-48.2 Cummins, J. (2006). A virtual breeze: Five tips that will have you sailing through your server virtualization projects. Network World website: http://www.networkworld.com/supp/2006/ndc5/082106-ndc-server-virtualization-tips.html?ndc3 Computer and Information Technology CIT 276 course website, (2007), http://www2.tech.purdue.edu/cit/Courses/CPT276/ Page 12.1580.9
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2010 Annual Conference & Exposition
Authors
Ashley Banaszek, Missouri University of Science and Technology; Hong Sheng, Missouri University of Science and Technology; Richard Hall, Missouri University of Science and Technology; Ronaldo Luna, Missouri University of Science and Technology; Ghulam Bham, Missouri University of Science and Technology
Tagged Divisions
Information Systems
learning effectiveness, “realworld” applicability, and motivation (see Figure 1). The lecture, however, outscored the labin learning effectiveness and motivation. It is also important to note that only one-third of theparticipants had used GIS software previously.Question Course component Lab Lecture TextI learned a great deal from ... 6.333 6.833 5.167The … was applicable to “real world” engineering. 7.667 7.500 5.833I have found the … to be very motivational. 5.167 6.500 4.833Figure 1. Item ratings (on a nine-point scale
Conference Session
IT-based Instructional Technologies
Collection
2010 Annual Conference & Exposition
Authors
Javad Shakib, DeVry University; Mohammad MUQRI
Tagged Divisions
Information Systems
perspective, Javawas at the right place and at the right time. The World Wide Web was just emerging as atechnology that may finally allow every computer to communicate with others. The problem waslack of interactivity. Java did that in the form of shiny and multi-media rich applets.The Enterprise wasn't very impressed, however. Enterprise applications require much moresophistication. Partly due to the World Wide Web phenomenon, the network became an integralpart of the enterprise. Corporate LANs turned into WANs. Internet, Intranets, and Extranetsbecame commonplace. The growth of the networks shifted the strategy for much of theenterprise. For one thing, the enterprise became more complex and larger than before. Isolatedsystems were no longer
Conference Session
Information and Network Security
Collection
2010 Annual Conference & Exposition
Authors
Xiangchun Cheng, Zhejiang University of Technology; Min Chen, Zhejiang University of Technology; Rong Gu, WWW.ZJUT.EDU.CN; Yingzhen Weng, Zhejiang University of Technology
Tagged Divisions
Information Systems
Reality (VR) is wildly used in education and training, commonly associated with itsimmersive, highly visual, three dimension (3D) environments. This paper presents a virtualassembly system on automobile engine based on VR and simulation techniques. In order toimprove the effects of skills training and make the system more scientific, the author introducedcognitive psychology into the design process. This system can be used as a support tool for skillstraining in automobile engine assembly, providing learners with virtual experience as asupplement to inadequate and insufficient real-world hands-on experience in highly visual 3Denvironment.IntroductionSince the National Research Council issued a study that spotlighted the need for universities
Conference Session
POTPOURRI
Collection
2010 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, University of Pennsylvania; Afsaneh Minaie, Utah Valley University; Chad Dean, Utah Valley University
Tagged Divisions
Information Systems
covering time series mining by looking intohow to mine data streams. They end the class with a look at how data mining is applied and usedto detect fraud.Topic BasedThe topic based course does not follow a specific textbook nor is it primarily focused on thederivation and intricacies of the various algorithms used in data mining. This style of coursemixes the standard topics of clustering, linear regression, classification trees and distributionwith real world applications. Instead of using a single textbook, a combination of researchpapers, web articles and selections from various books are used to provide background for thetopic to be covered.Brigham Young University4 offers a course that fits this description. It starts with a look at howdata
Conference Session
Emerging Information Technologies
Collection
2010 Annual Conference & Exposition
Authors
Nipul Patel, Purdue University, North Central
Tagged Divisions
Information Systems
amongproviders and patients. These issues include the role of wireless innovations in health care,technological hurdles, a fragmented cell phone market, and differences between that market and Page 15.1376.7the health care market. Nevertheless, some experts believe that wireless health care applicationsare promising.Some key forces are driving momentum for wireless applications in health care:• Wireless devices and networks allow continuous and real time link between the patients and the health care system. Remote monitoring enables health care providers to rapidly identify signs of abnormal function and provide timely intervention to avoid
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Richard Smith, U. of St. Thomas - St. Paul
Tagged Divisions
Information Systems
require the mathematical background, but do not teachanalytical techniques. Instead, they present lists of technologies and processes, which often yieldcourses based more on rote memorization or simple applications of predefined solutions to Page 13.255.2recognized problems. This does not prepare students to analyze real world problems, whichevolve continuously in the face of escalating security threats.This led us to develop our own course from scratch. Originally entitled “Elementary InformationSecurity,” the first word was eventually dropped. The course covers the following: • Security policy concepts • Risk and vulnerability assessment
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Azzedine Lansari, Zayed University; Akram Al-Rawi, Zayed University; Abdallah Tubaishat, Zayed Univeristy; Faouzi Bouslama, Université Laval
Tagged Divisions
Information Systems
to solve real-world problems. This is the first exposure students have to the concepts ofproblem solving. In the second year of the IS curriculum, students learn programmingmethodology and how to solve a problem without using a particular programming language.Students learn how to create applications using VisualBasic.NET programming language whichhas become popular among students. They also learn web programming which includes HTMLand XML. In the third year of the IS curriculum, students learn programming and problemsolving again using VB.Net at a higher level. Here, students learn advanced concepts of object-oriented programming and IT hardware and software while staying focused on problem solving.The elective courses provide an
Conference Session
IT-based Instructional Technologies
Collection
2010 Annual Conference & Exposition
Authors
Mudasser Wyne, National University, San Diego, USA; Anil Kumar Domakonda, National University, San Diego, USA; Pradeep Goutam, National University, San Diego, USA; Jayanth Kadlur, National University, San Diego, USA
Tagged Divisions
Information Systems
, with the improvement of internet technologies and hardware supports, wecan find that internet have become an important part in our daily life. Thus with theenormous use of the networks, many real world activities are now handled as WorldWide Web applications. Our focus in this paper is a complete conference managementsystem, we observe that in the last few years, several web based conference managementsystems have been developed and are being used by many international conferences allover the world. However, some of these systems are not available for free to theacademic community and some of them are restricted in terms of options and flexibilitythat they provide to the users. Some of the available systems do not support multipletracks in the
Conference Session
Information and Network Security
Collection
2010 Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University; Ricardo Monterrosa, DeVry University; Rammy Badran, DeVry University
Tagged Divisions
Information Systems
ranges can be realized with special hardware. Table 1: RFID Frequencies, Applications, and Typical Ranges 5System Description:The ALTS implements RFID to read the tag on a piece of luggage as it is being loaded onto aplane. In the real world application an airline employee will enter a passenger’s information intothe system and he associates this information with the tag’s unique ID. There is a Graphic UserInterface ( GUI ) that is strictly for the employees to enter this information and add the tag.Another GUI is provided for the passengers to confirm their flight and check their
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
Kyle Lutes, Purdue University; Richard Mislan, Purdue University, West Lafayette
Tagged Divisions
Information Systems
AC 2008-2195: THE DEVELOPMENT OF A FORENSICS TOOL FOR WINDOWSMOBILE DEVICESKyle Lutes, Purdue University Kyle Lutes is an Associate Professor of Computer & Information Technology (CIT). He has authored/co-authored numerous papers, many of which were presented at national conferences or published in trade magazines/journals as well as two college textbooks. His background and interests cover all areas of software development, including mobile computing, client/server information systems, web application development, object-oriented programming (OOP), programming languages, software engineering, user interface design, and rapid application development (RAD). Kyle has been writing
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley State College; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Information Systems
Copyright © 2009, American Society for Engineering EducationDatabase Engineering Requirements (42 Credit Hours)All students graduating in database area of specialization must complete 42 credit hours whichconsist of 27 credit hours core and 15 credit hours electives:Database Engineering Core Courses: 1. CS 2450, Software Engineering (3.0 CR) Presents concepts, methodology and best-practices necessary to develop large scale software projects. Includes step-wise software requirements analysis, design, implementation, testing and release. Discusses software generation, reuse, scheduling, verification, and maintenance. Emphasizes current “real world” industry best-practices and tools
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
couldnot extract the passwords without the key 7.LC5LC5 is a robust application with extensive features and a comprehensive graphical user interface.LC5 is high end professional software with versions available at various price ranges from $650to $1,750 depending on the type of license purchased 1. Among its many features, LC5 allowsautomated and schedulable password scanning, remote system scans from multiple domains,multiple assessment methods and rapid processing with pre-computed password tables and use ofmultiple dictionaries and international characters. Support is provided for both Windows andUNIX as well. The user interface provides real-time information on assessments and will reportscores on recovered passwords from a baseline of
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Abul Azad, Northern Illinois University; Ghayasuddin Mohammed, Northern Illinois University; Mohammed Murtuza, Northern Illinois University; Muhammed Abedur Rahman, Northern Illinois University
Tagged Divisions
Information Systems
with an involved actuation and sensing network. A basis forthis approach is a manipulator model capable of reproducing the fundamental system dynamicsin a given application and amenable for real-time computation. This discussion leads to the factthat effective controller designs for flexible manipulators are the key issue to make flexiblemanipulator systems attractive for the industries.3. Theoretical Developments As mentioned in the previous section, the full potential of flexible manipulator systemscan’t be explored until the vibration control issue can be resolved. To address this, along withcontroller designs, one needs to understand the behavior of flexible manipulators. With thisscenario, the lead author has designed and
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Xiaoxi Martin, Western Carolina University; Brant Price, Western Carolina University; James Zhang, Western Carolina University; Duane Dunlap, Western Carolina University; Robert Adams, Western Carolina University
Tagged Divisions
Information Systems
EducationAfter the connection had been established, a local-host (127.0.0.1) was used to go through theprocesses of login, creating account, and taking the tests. By doing so, the results were displayedand stored in the database for administrative access.When students finish and pass all the required tests in a satisfactory manner, they are given alink, and directed to internet software for real time control over laboratory equipments. In thisproject, the remote access software, LogMeIn (available from www.logmein.com), is used tologin to lab equipment application software. Before a student is granted control of the laboratoryequipment, they are required to login once again using their student ID and password. A pop-upwindow is displayed for
Conference Session
IT-based Instructional Technologies
Collection
2009 Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley State College
Tagged Divisions
Information Systems
developers write software. This paper will study differentapproaches that are used by different institutions of higher education around the world tointegrate parallel computing into their curriculum.Teaching parallel computing concepts to undergraduate students is not an easy task. Educatorsneed to prepare their students for the parallel era.IntroductionA fundamental technique by which computations can be accelerated is parallel computation. Themain reason for executing program instructions in parallel is to complete a computation faster.However, majority of programs today are incapable of much improvement through parallelism,since they have written assuming that instructions would be executed sequentially1. Sincesequential computer performance has
Conference Session
IT-based Instructional Technologies
Collection
2010 Annual Conference & Exposition
Authors
Yi-Cheng Chen, Meiho Institute of Technology; Yi-Chien Lin, Meiho Institute of Technology; Ron Chuen Yeh, Meiho Institute of Technology, Taiwan; Kuo-Hung Tseng, Meiho Institute of Technology
Tagged Divisions
Information Systems
change.Our communication patterns have changed.E-commerce (EC) is based not only on developments pertaining to the Internet compound, butalso on prior technological and organizational innovation arising from the combinations oftelecommunications and network computing (Zwass, 2003). We have become dependent onInternet. We interact with firms via Web sites. The proliferation of Internet has stimulated thedevelopment of online commercial applications and business innovations, commonly referred toInternet-enabled commerce (I-commerce). The next wave introduced through mobiletechnology is about to change our lives and business world even more. The increase intransmission capacity of wireless devices lays the foundation for transaction unrestricted
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Shuju Wu, Southeast Missouri State University; Ragu Athinarayanan, Southeast Missouri State University; Xiaobing Hou, Southeast Missouri State University; Sophia Scott, Southeast Missouri State University
Tagged Divisions
Information Systems
Technology[2] and gave students a conceptual understanding of engineering, Page 13.755.2as well as, design, social and professional skills. Survey results from Etkina & Murthy [3] indicatethat laboratory activities help students learn the content, work in groups and apply the content tothe real world. Accompanying the TCN curriculum are two networking laboratories, as will beintroduced in the section of “Current Laboratory Approach”. The two laboratories featuresadvanced and state-of-the-art devices such as computers, laptops, routers, switches, securityappliances, wireless access points, telecommunications training stations, and are
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Frank Kowalkowski, Knowledge Consultants; Gilbert Laware, Purdue University
Tagged Divisions
Information Systems
Enterprise Analysis (Prentice – Hall, ISBN 0-13-282-3365) and over 70 papers. Frank has been the keynote speaker as well a conference chair at several conferences. He conducts frequent seminars nationally and internationally on a variety of business management and information technology topics.Gilbert Laware, Purdue University Gil Laware is an Associate Professor at Purdue University in Computer Information & Technology department. He has over 30 years of consulting and industry experience in projects that span world-wide data management and web/database solutions, business process and knowledge management, and enterprise application integration. He is the Vice President of Research
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Philip Lunsford, East Carolina University; Chip Popoviciu, Cisco Systems, Inc.
Tagged Divisions
Information Systems
, project management, and Cisco systems networking solutions. He holds a MBA from Wayland Baptist University. He also holds various industry certifications to include; A+, Network+, MCSE, MOUS, and CCNP.Philip Lunsford, East Carolina University Phil Lunsford received a B.S. in Electrical Engineering and a M.S. in Electrical Engineering from Georgia Institute of Technology and a Ph.D. in Electrical Engineering from North Carolina State University. He is a registered professional engineer and is currently an Assistant Professor at East Carolina University. His research interests include system simulation, telemedicine applications, and information assurance.Chip Popoviciu, Cisco Systems, Inc
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
David Dampier, Mississippi State University
Tagged Divisions
Information Systems
enforcement community whilesimultaneously including students at the undergraduate and graduate levels in digitalforensics service, learning and research. The program has been highly successful withinvolvement of PhD students, Master’s level students, and undergraduates who arefocusing on the computer security/digital forensics area of interest. Computer crime is arapidly growing problem throughout the connected world. Not only are computer crimesbecoming more numerous and commonplace, the sophistication of computer criminals isalso increasing. As technology has increased in sophistication, and criminals haveexploited new technologies, computer forensics investigators trying to solve those crimeshave had to learn new techniques. This trend has
Conference Session
IT-based Instructional Technologies
Collection
2009 Annual Conference & Exposition
Authors
Susan Miertschin, University of Houston; Cheryl Willis, University of Houston
Tagged Divisions
Information Systems
., Computer-based concept mapping a cognitive tool for students: a review. IFIP, 16th World Computer Congress 2000: Beijing, 2000; p 331-338.11. Zhang, J.; Norman, D. A., Cognitive Science 1994, 18, 87-122.12. Hutchins, E. L., Cognition in the Wild. The MIT Press: Cambridge, MA, 1995.13. Wright, P. C.; Fields, R. E.; Harrison, M. D., Human-Computer Interaction 2000, 15, 1-41.14. Georgiadou, E.; Hatzipanagos, S.; Berki, E., Proceedings of the 3rd ACS/IEEE International Conference on Computer Systems and Applications 2005, 878-882.15. Armatas, C.; Holt, D.; Rice, M., Distance Education 2003, 24, 141-158. Page 14.1300.1116. Tergan, S
Conference Session
Information Technologies Classroom Instruction
Collection
2008 Annual Conference & Exposition
Authors
Mohammad Dadfar, Bowling Green State University
Tagged Divisions
Information Systems
final acknowledgement to P0 and quits. */ } Figure 2: The Description of A Sample Solution for Process Communication Page 13.925.53. A Practical ApplicationThe previous section discussed inter-process communication among multiple processes. In thissection we discuss a project that provides a more real-life context of an actual application that thestudents are already familiar with. Request For Comments (RFCs) are documents available overthe web that describe the inner workings of various protocols and applications8. One suchdocument, 'rfc821' relates to the Simple Mail Transfer Protocol (SMTP)9.The project is to build a
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2009 Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Information Systems
gained from Hardware and Software interfacing and integration ≠ Use of programming languages such as C, C#, Assembly, and JAVA ≠ Learning microcontroller’s architectures ≠ Using new IDEs Page 14.527.10 ≠ Learning how to define system requirements, partition the design into subcomponents, design, build, test, and verify that the system requirements have been met ≠ Developing project management skills ≠ Developing written and oral communication skills and other professional skills ≠ Designing and defending a solution to a real world problemOverall, students have positive comments about this course and are
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Stephen Gilbert, Iowa State University; Pam Shill, Iowa State University; Kevin Saunders, Iowa State University
Tagged Divisions
Information Systems
colleagues is critical to narrowing the gendergap in EIT fields and decreasing the masculine culture that exists in many STEM disciplines.Industry Field Trips (2-3 times in the summer) – LOs 2, 3, 14To expose students to the real-world application of EIT, we coordinate visits to relevantuniversity industry partners within a two-hour drive such as John Deere (virtual realityengineering, manufacturing), Rockwell Collins (cutting edge EIT), Principal Financial (usabilitylab), Mechdyne (immersive VR displays) and the Great Ape Trust (using icon touch devices forape communication).Blogging (daily) – LOs 2, 13, 14Students are required blog daily on our SPIRE-EIT wiki about their experience in the REU andcomment on at least two other students’ blog posts
Conference Session
Information and Network Security
Collection
2009 Annual Conference & Exposition
Authors
Tokunbo Ogunfunmi, Santa Clara University
Tagged Divisions
Information Systems
the use of multiple transmit and receive antennas, or MIMOtechnology, to achieve throughput rates of around 135Mbps in real-world conditions. The other proposal was by the TGn Sync group, which consisted of Atheros Communications,Intel, Philips, Sony, among others. The proposal suggested doubling the bandwidth to 40MHz, toessentially double throughput. In addition, other, more sophisticated processing techniquesallowed the TGn Sync devices to transmit data at rates up to 315Mbps. Over the following months, the two proposals evolved to form the main competing proposalsfor IEEE 802.11n standard. Both offered MIMO communications capability, with up to fourtransmit and four receive antennas. Both also supported an optional 40MHz bandwidth