nor fuel the ethical objections to emerging technologies. As knowledgeable citizens, the role of ethical engineers and scientists involved inresearch can be envisaged as going beyond educating society passively and becoming anessential part of helping society establish a public policy regarding emerging technologiesthrough properly informing society of the facts. In order for these public policies to moveresearch and development past gridlocks of advancement based on prejudiced perception, theymust encompass middle ground solutions.Keywords: Ethics of emerging technologies, Societal impact, Bioethics, ethics engineering.Introduction To understand the need for ethics in emerging biomedical research it is imperative tounderstand
monitor normal operations,detect and analyze abnormal conditions, and ensure safe operation in nuclear facilities. EMTprogram has acquired new radiation detection equipment for teaching laboratory. The laboratoryactivities introduce students to various types of detectors used to measure radiations and thegeneral properties of radiation detection systems. The hands-on equipment operation training canfurther enhance the students’ educational experience. This laboratory module can be infused innew course (Introduction to Nuclear Technology) and other existing courses.4.3.5 Virtual Reality Teaching ProgramThe greatest challenge facing emergency response personnel is the ability to train effectively.Recent information technologies make it possible to
computer and communications technology — will impact the "classroom of thefuture"9 , few studies have been completed that document how and in what ways learning is affected by use oftechnology-based delivery systems SUMMARY AND FUTURE CHALLENGES Currently available technology can and should be better utilized to enhance the classroom experience,and ultimately help students learn. Emerging computer and communications technology will further enhancestorage, access, and display capabilities in the classroom. Perhaps the most significant challenge is not techno-logical, but rather cultural — that of convincing both students and faculty of the "need to do things differently"in the midst of the information age
, DIS demands low bandwidth, high frequency communication among nodes, while VM will generally demand high bandwidth, low frequency, with the frequency being high when analyzing processes much faster than real time. · Do these extreme difference preclude VM from taking advantage of DIS accomplishments in networking and standards? · What are the differences in requirements between integrating distributed information systems and integrating distributed manufacturing models?4. Results and DiscussionsBased on the literature search to identify the key issues for realizing VM, it can be summarizedthat new integration technologies and philosophies are emerging. Visualization hardware andsoftware is becoming more
AC 2007-1955: IPV6 COURSE DEVELOPMENT FOR INFORMATIONTECHNOLOGY CURRICULUMSJohn Pickard, East Carolina University John Pickard has more than 15 years in the Technical training profession and 9 years experience in the information technology field. John has held various positions and has experience involving management, designing, testing and teaching of data networks, enterprise networking systems, digital switching systems and transmission systems. Currently, John is a faculty member at East Carolina University and holds an instructor position in the Department of Technology Systems. John is also a senior trainer at Network Training and Consulting and teaches courses in networking
AC 2011-96: IMPLEMENTING BUILDING INFORMATION MODELINGIN CONSTRUCTION ENGINEERING CURRICULADon Chen, University of North Carolina, Charlotte Professional Preparation Iowa State University, Ames, Iowa Civil Engineering Ph.D. 2006 Iowa State University, Ames, Iowa Civil Engineering M.S. 2002 Iowa State University, Ames, Iowa Statistics M.S. expected in 2011 Tongji University, Shanghai, China Civil Engineering B.S. 1992 Professional Appointments 5/09 present Assistant Professor, Department of Engineering Technology& Construction Management, University of North Carolina Charlotte, Charlotte, NC 8/06 5/09 Assistant Professor, Department of Technology, Ball State University, Muncie, IN 8/00 8/06 Graduate Research
A Curriculum Framework for the Emerging Discipline of Information Assurance James A. Davis, PhD Melissa Dark, PhD Information Assurance Center Center for Research in Information Department of E CPE Assurance and Security Iowa State University Purdue University Ames, Iowa West Lafayette, Indiana davis@iastate.edu dark@cerias.purdue.edu1. IntroductionIn this paper, we describe a community effort to identify the common body of knowledge (CBK)for computer security curricula. Academicians and practitioners have
NSF Assistant Directors - Emerging Trends and Programs Anne Kinney, Directorate for Mathematical and Physical Sciences Jim Kurose, Directorate for Computer and Information Science and Engineering Dawn Tilbury, Directorate for Engineering Joanne Tornow, Directorate of Biological SciencesOur new home NSF Champions Research and Education across all Fields of Science and EngineeringBiological Sciences Engineering Mathematical & Computer & Geosciences Physical Sciences Information Science (including Polar
-level, project-based electrical engineering courses and researches how kids learn engineering through informal engineering education activities.James Nelson, Arizona State University James Nelson is an undergraduate student in the Department of Engineering in the College of Technology and Innovation at Arizona State University. Page 23.368.1 c American Society for Engineering Education, 2013 Defining Makers Making: Emergent Practice and Emergent MeaningsIntroductionMakers are an emerging community of self-described DIY-enthusiasts, tinkerers
Session 2558 Emerging M-Education Model Utilizing Wireless Internet Technologies Leonid B. Preiser Department of Technology and Information Systems School of Business and Technology National University 4141 Camino del Rio South, San Diego, CA 92108-4103 (619) 563-7165, fax (619) 563-7160 lpreiser@nu.eduIntroductionThis paper examines the impact of the proposed Mobile Education Model (MEM) onenhancement of educational access and academic quality in
for integration ofmodularized emerging technology content and/or STEM applications of technologies.Therefore, it can be challenging to find the best course or courses and the best sequence of topicsto achieve maximum impact on student learning. One emerging technology (nanotechnology)curriculum modularization effort has reached over 6,000 students in secondary and post-secondary institutions. The design, development and implementation of various modularcurricula in different courses and institutions is discussed.This paper covers the initial implementation activities and the first cut of the results of theseefforts. This information is applicable to educators and/or institutions which desire todisseminate emerging technology information or
Paper ID #42341Scenario-based Emerging Technologies Workshop for Military LeadersDr. Aikaterini Bagiati, Massachusetts Institute of Technology Aikaterini (Katerina) Bagiati, Ph.D.: Having aquired a Diploma in Electrical Engineering and a Masters Degree in Advanced Computer and Communication Systems at the Aristotle University in Greece, and after having worked as a software engineer, and as a CS educator in both formal and informal settings for 10 years, in January 2008 I decided to leave Greece and get enrolled at the Graduate Program in the pioneer School of Engineering Education at Purdue University. In August 2011
. Page 12.982.1© American Society for Engineering Education, 2007 Introducing ZigBee Theory and Practice into Information and Computer Technology DisciplinesAbstractAs pervasive computing turns from the desktop model to the ubiquitous computing ideal, thedevelopment challenges become more complex than simply connecting a peripheral to a PC. Apervasive computing system has potentially hundreds of interconnected devices within a smallarea. This is not only a departure from the typical computer-peripheral model it is also adeparture from the typical client-server model.ZigBee, based on IEEE 802.15.4, is an emerging standard within networked embedded systems.It has already been adopted by several major developers and
thematic qualitative analysis ofinterviews from seven faculty members at two different institutions, representing three ITprograms. The research methodology and validity is discussed in the report.IntroductionInformation technology is a rapidly changing field encompassing many disciplines related tocomputing. In the past decade a university-level academic discipline, also somewhatambiguously called Information Technology (IT), has emerged. The academic discipline of ITfaces a number of challenges, including a shortage of educational academic resources; a recentlyemerged program definition; a very rapidly changing, complex technical discipline; instructionaldesigners with little training in instructional design; and an academic system that fails to
. Page 14.1132.1© American Society for Engineering Education, 2009 Teaching Emerging Technologies Using a Socio-Technological Development Model Weapons and Systems Engineering United States Naval AcademyIntroductionThe Systems Engineering department at the United States Naval Academy (USNA) offers anABET-accredited degree program that focuses on feedback control and mechatronics, includingaspects of mechanical and electrical systems design. Several years ago, an effort was beguntoward developing an engineering management elective track to supplement the existingspecialization courses in robotics, control theory, information systems and embedded
the course learning goals Learning Goals Instructional Instructor Actions Student Activities Strategies Understand and apply Lecture, Relay learning objectives Focus on learning objectives the entire design process discussion, case- Present short examples Work through examples to study experience designs processes Relevant knowledge of Lecture, lab demo, Relay important technical Digest key components of emerging technology discussion, information emerging technology Critical application of
Session 2566 Introducing Emerging Technology into the Mechanical Engineering Curriculum Gangbing Song, Jafet Lopez, Kairy Otero, Jason Ruby, Adam Shepherd, Jacob Salinas, Ross Kastor, and Richard Bannerot Department of Mechanical Engineering Josh Blankenship, Akbar Ng, Ben Stembridge and Paul Ruchhoeft Department of Electrical and Computer Engineering University of Houston AbstractIn the one semester, three engineering department, capstone design course taught in theCullen College of Engineering at the
2006-1652: INTRODUCTION OF EMERGING TECHNOLOGIES IN MECHANICSOF MATERIALSHonghui Yu, The City College of New YorkFeridun Delale, The City College of New York Page 11.839.1© American Society for Engineering Education, 2006 Introduction of Emerging Technologies in Mechanics of Materials Abstract Though technologies have advanced dramatically in the last century and Mechanicsof Materials(MoM) has found more applications in many new technologies, the MoMcurriculum has been fixed for decades. This paper presents our efforts in keeping MOMcurriculum current with the times by incorporating examples from emerging technologiesand everyday
AC 2010-1945: INCREASING TECHNOLOGICAL LITERACY THROUGHIMPROVED UNDERSTANDING OF TECHNOLOGY EMERGENCE ANDDIFFUSIONSteven Walk, Old Dominion University Steven R. Walk, PE, is Assistant Professor of Electrical Engineering Technology at Old Dominion University, Norfolk, Virginia. He recently was head of the Center for Technology Forecasting, and Director of the Maritime-Aerospace Liaison and Technology Development Center, at Maine Maritime Academy, Castine, Maine. His research interests include high voltage electromagnetic phenomena, energy conversion systems, technology management, and technological change and social forecasting. Mr. Walk is owner and founder of Technology Intelligence, a
sector.IntroductionCybersecurity is an emerging field with significant implications as the use of interconnecteddevices increases. The need for trained cybersecurity professionals is increasing, yet theworkforce is not increasing to match the need. Jeff Kaitlin in 2017 reported that: The ISACA, a non-profit information security advocacy group, predicts there will be a global shortage of two million cyber security professionals by 2019. Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cyber-security related roles, according to cyber security data tool CyberSeek. And for every ten cyber security job ads that appear on careers site Indeed
books) and informal documentation (such as user discussionforums and blogs). There usually is also greater demand for developers who are familiar withstandards-based technologies.Fortunately, many standards-based technologies have open-source, free implementations that arereadily available.Readily available documentation, books, and active user forumsSupport material for learning a technology as quickly as possible was important to being able toexplore and learn a technology with minimal frustration. In particular, books usually provide themost well-thought out explanation and discussion regarding their subject matter.In the case of many open source frameworks the primary author of the tool provides excellentdocumentation, but reserves the most
AC 2007-1360: A STUDY ON THE PERFORMANCE OF BLUETOOTH AND IEEE802.11B COEXISTENCEWarith Al-Sulaimani, Modern College of Business and Science-Sultanate of Oman Warith Al-Sulaimani is a Lecturer and Consultant at the Modern College of Business and Science, Oman. Warith earned a Bachelor’s Degree in Electronic & Electrical Engineering from the University of Strathclyde (UK), a Diploma in Computers and Information Systems from Sultan Qaboos University (Oman) and Master’s Degree in Advanced Computer networking from Glasgow Caledonian University (UK). His primary research focus is in the areas of Wireless Networking, Internet Technologies and Network Security. He holds certifications in A
concerned with statements that express anaspect or relationship about the structure of a business. A derivation is concerned withstatements that can be used to derive additional information about the business, whereasan action assertion is a statement that controls or limits the actions of the business. Actionassertions are important as they define constraints that a business[5] should or mustoperate under. A business often has many operating constraints that will be implementedin various users’ application programs. Capturing and documenting business rules in anapplication program can lead to consistency and manageability issues that ultimatelyleave the database in an inconsistent state[3].A more modern and more reliable approach is to define the
AC 2008-2195: THE DEVELOPMENT OF A FORENSICS TOOL FOR WINDOWSMOBILE DEVICESKyle Lutes, Purdue University Kyle Lutes is an Associate Professor of Computer & Information Technology (CIT). He has authored/co-authored numerous papers, many of which were presented at national conferences or published in trade magazines/journals as well as two college textbooks. His background and interests cover all areas of software development, including mobile computing, client/server information systems, web application development, object-oriented programming (OOP), programming languages, software engineering, user interface design, and rapid application development (RAD). Kyle has been writing
and participate in capstone projects to achieve substantive deliverables that do not result ina working product or system.Students building a working prototype product or system are operating in primarily in theproduct-oriented, phase of the complete system development life cycle. There are hiddenassumptions in the design of capstone courses that encourage students to work in that phase.A student team can accomplish the learning objectives of a technical capstone project byfollowing a clearly defined design and development process resulting in project deliverables thatare not a working prototype.Recently, an Information Technology (IT) capstone student team at Brigham Young Universityselected a project that requires them to follow a systems
without graduate programs withaccepting some students from higher-ranked schools to achieve both a diversity of backgroundsand a higher likelihood of project success. Participant application packages are thereforeevaluated on the following criteria: • Minimum 3.0 GPA • Previous research experience • Discipline of study, to help round out our interdisciplinary teams • Ranking of educational institution of the applicant (see above paragraph for strategy) • Interest in the areas of Human Computer Interaction and Emerging Interface Technologies • Gender and race/ethnicity to achieve a diverse cohort • Existing information technology skills • Writing ability • Evidence
AC 2009-1644: IMPROVING DATABASE ENGINEERING CURRICULUMReza Sanati-Mehrizy, Utah Valley State CollegeAfsaneh Minaie, Utah Valley University Page 14.704.1© American Society for Engineering Education, 2009 Improving Database Engineering CurriculumAbstract:Our university is a liberal art university with primarily undergraduate programs located in anarea with many technology oriented business. In our Computer Science program, we offer aDatabase Engineering area of specialization which includes a number of database related coursesbut does not include any data mining related course.A study has shown that some universities and colleges offer very few database related
materials to show to future employers.IntroductionEarly in the development of the IT program at Brigham Young University we created a coursethat incorporated an introduction to the core concepts of Information Technology from theperspective of web development and deployment2,3. As we designed the course we wereconfronted with the problem of providing a cost-effective deployment experience for eachstudent. We did not have budget or space for multiple computers per student so we began toexplore virtualization as an alternative. We had been using VMware but found that we couldonly run 2-3 LAMP (Linux, Apache, MySQL and PHP/Perl) servers on our available hardwareand were thus still confronted with smaller but insurmountable budget, hardware, and
. His research interests include Database, intelligent systems, information system and health informatics. He is the author of numerous journal and conference publications. He has managed numerous projects for various private companies and government organizations. Dr. Wyne is a member of ASEE and ACM.Arzu Baloglu, Marmara University, Turkey Dr. Baloglu, completed her undergraduate at Technical University of Istanbul, her MBA in production management, and her PhD in Information Technology at University of Istanbul. She has experience of 15 years in production and technology management. She worked for various plants including manufacturing, service and consulting companies as middle or top
AC 2007-1242: COMPARATIVE EVALUATION OF ZIGBEE AND BLUETOOTH:EMBEDDED WIRELESS NETWORK TECHNOLOGIES FOR STUDENTS ANDDESIGNERSJanell Armstrong, Brigham Young University Janell Armstrong is a Graduate Student in Information Technology at BYU. Her interests are in ZigBee and public key infrastructure. She has three years experience as a Teacher's Assistant. Student memberships include IEEE, IEEE-CS, ACM, SWE, ASEE.C. Richard Helps, Brigham Young University Richard Helps is the Program Chair of the Information Technology program at BYU and has been a faculty member in the School of Technology since 1986. His primary scholarly interests are in embedded and real-time computing and in technology