Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 361 - 390 of 12049 in total
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Gamification is a new emerging pedagogical technique in higher education to engage students into a non-game context during the last five years. A cyber enabled learning environment can provide a collaborative and sustainable platform for learners to continue studying outside the classroom and lecturing time. In this paper, we describe the design mechanisms of gamification used in a software testing cyber enabled learning environment, named WReSTT-CyLE (Web-Based Repository of Software Testing Tutorials – a Cyberlearning Environment) and the experimental results of class studies at Alabama A&M University. As a highly integrated online learning tool, other than gamification technology, WReSTT-CyLE
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Hassan Rajaei, Bowling Green State University; Eman A. Aldakheel, Bowling Green State University
Tagged Divisions
Computing & Information Technology
Page 25.318.1 c American Society for Engineering Education, 2012 Cloud Computing in Computer Science and Engineering Education Abstract Cloud  Computing  opens  a  new  chapter  in  Information  Technology.  It  has  its  roots  in  internet technology,  and  like  the  Internet,  it  is  rapidly  and  forcefully  advancing  into  a  large  range  of applications and services. While standardization of Cloud Computing is ongoing, there is every indication  that  cloud  technology  is  here  to  stay  and  will  cover  most  sectors  of  the  society, including  education.  This  paper  discusses  the  potentials  of  Cloud­Based  Education  (CBE)  in STEM areas to better stimulate and engage students in their
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
self-powered nodeswhich gather information or detect special events and communicate in a wireless fashion, withthe end goal of handing their processed data to a base station. Sensing, processing andcommunication are three key elements whose combination in one tiny device gives rise to a vastnumber of applications. Sensor networks provide endless opportunities but at the same time poseformidable challenges, such as the fact that energy is a scarce and usually non-renewableresource.2.1 WSN System Architecture, Network Topologies and StandardsWireless technology offers several advantages for those who can build wired and wirelesssystems and take advantage of the best technology for the application. To do this, you needflexible software
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University (ENG); Charles Richard Cole, Southern Polytechnic State University; Christopher Welty, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
with several ACM and IEEE publications in virtual and augmented reality and has recently published a book chapter in the Handbook for Augmented Reality (Springer). As a graduate student in the Graphics, Visualization, and Usability (GVU) Center at the Georgia Institute of Technology, he contributed to early research in the nascent field of self-harmonizing karaoke software. He currently serves as an Associate Professor in Computer Game Design and Development, teaching courses such as Computer Graphics (OpenGL), 3D Modeling and Animation, and Production Pipeline & Asset Management. He has served in a variety of capacities academically including Interim Department Head, Associate Dean of the College of Information
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Lifang Shih, Excelsior College; Jane A LeClair, Excelsior College
Tagged Divisions
Computing & Information Technology
groups or team projects. 5. Demonstrate an ability to understand professional, ethical and social responsibilities, including the impacts of culture, diversity, and interpersonal relations. 6. Demonstrate proficiency in communicating technical information in formal reports, documentation, and presentations to users and information technology professionals. 7. Demonstrate the ability to identify and analyze the impacts of information technologies and computing on public, organizations, and individuals. 8. Demonstrate the ability to identify and apply current and emerging technologies and tools for information technologies solutions. 9. Demonstrate expertise in the core information technologies data base
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Simin Hall, Virginia Tech; Clifford A. Shaffer, Virginia Tech; Eric Fouh, Virginia Tech; Mai Hassan ElShehaly, Virginia Tech; Daniel Breakiron, Virginia Tech
Tagged Divisions
Computing & Information Technology
Paper ID #5951Evaluating Online Tutorials for Data Structures and Algorithms CoursesDr. Simin Hall, Virginia Tech Dr. Simin Hall is a Research Assistant professor in the Department of Mechanical Engineering (ME) at Virginia Tech (VT). Currently she is collaborating with Dr. Cliff Shaffer in Computer Science Department on a National Science Foundation funded TUES project to improve instruction in Data Structures and Al- gorithms (DSA) courses. Her applied research in education is in cognitive functioning using online learn- ing technologies. She has redesigned two undergraduate courses in Thermodynamics for online
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Huanmei Wu, Indiana University-Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
graduate students listed.Based on the limited information of 15 DSA programs, the average number of BS, MS and PhDstudents for the DSA programs are 47 students per programs.2.2. Curriculum and program competencies: Because of excessive advancement in technology,there are many tools and techniques are emerging in this field. It is a great challenge for traineesto stay up to date and mould with the changing technologies. The DSA programs are expectedfrom trainees that they would be skilled in different programs under DSA like data mining, datascience, data handling, and some programming languages as well as with basic databasetechnologies. A trainee needs to know good understanding of DBMS and cloud computingemerging with the knowledge of the field
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Lorri J Barnett, Purdue Polytechnic, Anderson; Dennis O. Owen, Purdue University
Tagged Divisions
Computing & Information Technology
, manage, and improve operations. Skills Include: Systems Integration Planning RFP Development/Grant Writing Technical management including software development, system administration , telecommunications Professional Development Process Re-engineering Disaster Recovery End User Training ERP Design/Implementation IT Manage- ment Project Management Solution Engineering Systems SupportProf. Dennis O. Owen, Purdue University Dennis Owen is an Associate Professor of Computer and Information Technology at Purdue University. His primary teaching interests include application development and computer hardware. He is active in recruiting and curriculum transformation. c American Society for
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Te-shun Chou, East Carolina University; Steve Keith Baker, East Carolina University; Miguel Vega-Herrera
Tagged Divisions
Computing & Information Technology
interests include networking and security. I also enjoy teaching emerging technology classes and working with the Internet of Things. My background includes twenty years of IT experience with both the private and public sectors. I try to bring real-world examples into my classroom, and provide students with a well-rounded view of expectations in the workforce.Miguel Vega-Herrera c American Society for Engineering Education, 2016A Comparison of Network Simulation and Emulation Virtualization ToolsAbstractPacket Tracer (PT) is an official Cisco software simulator for exercising Cisco networkequipment. Graphical Network Simulator (GNS3) is a free emulator software which allowsrunning actual networking software
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Chris Foreman, Purdue University, West Lafayette; Matthew Turner, Purdue University (Statewide Technology); Karl Perusich, Purdue Statewide Technology DO NOT USE DUPE
Tagged Divisions
Computing & Information Technology
Computer Information Science (CIS), but for students in engineering whoutilize ICS as a tool to control a physical process, e.g. critical infrastructure. Page 26.573.22. Integration into existing programsCyber-security concepts are at least generally addressed in CIS and related disciplines such asInformation Technology (IT) and Computer Science (CS), if not specifically addressed in cyber-security concentrations within these. What is missing from these is an understanding of real-timecontrol systems as they are deployed in industry, and their associated industrial processes, asthese tend to be addressed in the electrical, mechanical, and
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing & Information Technology
/topic/1056150/data-mining.3. Isinkaye O. Flasade, Computational Intelligence in Data Mining and Prospect in Telecommunication Industry, Journal of Emerging Trends in Engineering and Applied Science, (JETES) 2 (4): pp. 601-605.4. Mabroukeh NR, Ezeife CI. A taxonomy of sequential pattern mining algorithms. ACM Computing Surveys 2010; 43:1.5. Han J, Cheng H, Xin D, Yan X., Frequent pattern mining: current status and future directions. Data Mining and Knowledge Discovery 2007; 15 (1): 55–86.6. Han et. al., Data Mining Concept and Technology, Third Editio, Morgan Kaufmann, 2012.7. Robert, L. Kruse and Alexander J. Ryba, Data Structures and Program Design in C++, Prentice Hall,1999.8. Dugdale DC, Henochowicz SI, Zieve D. Allergic
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Christina Frederick, Embry-Riddle Aeronautical University - Daytona Beach; Lulu Sun, Embry-Riddle Aeronautical University - Daytona Beach; Caroline Liron, Embry-Riddle Aeronautical University - Daytona Beach; Matthew A. Verleger, Embry-Riddle Aeronautical University - Daytona Beach; Rachel Marie Cunningham, Embry-Riddle Aeronautical University - Daytona Beach; Paula Sanjuan Espejo, Embry-Riddle Aeronautical University - Daytona Beach
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Human Factors and Systems Department at Embry- Riddle, where her work focused on applied motivation and human factors issues in aviation/aerospace. Dr. Frederick also served in various roles in University administration between 2004-2012, including Vice President for Academics and Research. Dr. Frederick’s current research interests examine how individual differences interact with technology to enhance educational engagement and performance. Dr. Frederick is the author of more than 50 research publications, 4 book chapters and over 60 regional, national and international conference presentations on a wide range of topics in human factors and psychology. She is active in a number of professional associations, and is a
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Stephen J. Zilora, Rochester Institute of Technology (CAST); Jim Leone
Tagged Divisions
Computing & Information Technology
Paper ID #8604A Mature Approach to AssessmentProf. Stephen J Zilora, Rochester Institute of Technology (CAST) Stephen Zilora is an Associate Professor and Chair of he Information Sciences and Technologies Depart- ment at Rochester Institute of Technology. For nearly 15 years he has been researching and teaching software application technologies and development processes, areas in which he also has over 20 years of industry experience.Prof. Jim Leone Page 24.65.1 c American Society for
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Daniel Raviv, Florida Atlantic University; Yumi Kahori Nakagawa; George Roskovich, Florida Atlantic University
Tagged Divisions
Computing & Information Technology
me to figure out how to implement it in actual code on my own.”A4: “Relate every algorithm learned to a real world example. Use a visual tool (such as those mentionedin the survey i.e, 3-D puzzles, a visual computer animation, or a hands-on activity) to show how theoverall algorithm works, but also at each part of the code/pseudo-code to understand what is happeningon each line.” 4. Conclusion and Ongoing Work As technology progresses, the way students perceive and learn information changes as a result.To adapt to this trend, methods must be further developed and implemented to ensure a higher rate ofsuccess not only in letter grades but students’ understanding and retention of the theories being taught. Bycatering to popular
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
Curriculum Report. The Computer Sciencedegree at UVU was accredited by Accreditation Board for Engineering and Technology (ABET)in 2002 and currently has more than 800 students. Students in this program take core coursesuntil the first semester of their junior year, when they begin choosing their electives for differentspecialization areas.Computer Engineering Curriculum at UVUThe UVU computer engineering area of specialization relies on a core curriculum shared withthe other areas of specializations within the computer science department. It consists ofintroductory courses in programming, discrete mathematics, data structures, operating systems,networking, computational theory, and computer architecture. Computer engineering studentsspecialize with
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Edward F. Gehringer, North Carolina State University
Tagged Divisions
Computing & Information Technology
peerreview: The Expertiza approach,” Innovate—Journal of Online Education 3:6 (August/September 2007).[10] Gehringer, E.F., “Expertiza: information management for collaborative learning,” in Monitoring andAssessment in Online Collaborative Environments: Emergent Computational Technologies for E-LearningSupport, A. A. Juan Perez [ed.], IGI Global Press, 2009.[11] Solihin, Yan, Fundamentals of Parallel Computer Architecture: Multichip and Multicore Systems,Omnipress, 2008.[12] Michigan Process Controls and Dynamics Textbook, www.controls.engin.umich.edu, [accessed Mar.2011] Page 22.676.10Proceedings of the 2011 American Society for
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona; Mohammad Rafiq Muqri, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
component. The lab experiences gained may be very suitable fordemonstrating the analysis and design of combinational and sequential logic circuits, but they donot teach the students how to interface digital circuits with analog circuits or computer software.Moreover, there is no gradual path and ramp from those small and compartmentalized labexperiments to a very large open-ended senior project.2. DeVry University’s Senior Project Capstone Course SequenceThe College of Engineering and Information Sciences at DeVry University offers a sequence ofsenior project courses under its ECET (Electronics Engineering Technology/ComputerEngineering Technology) program. The senior project is a four-session course sequences (eightweeks per session) in which
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Afsaneh Minaie, Utah Valley University; Ruhul H. Kuddus, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai
Tagged Divisions
Computing & Information Technology
three nodes and each node represents three branches similarly. Forinformation retrieval, where these sequences represent keys of records, each nodecontains a pointer to the record of information with this sequence as its key. This datastructure can be used to represent the sequences of events where each branch of a noderepresents an event and each path in the tree represents a sequence of events. When apath terminates, it means that the corresponding sequence of events came to an end. Eachnode of the tree can be considered the outcome of a sequence at a particular time. Theconcatenation of events along the path from the root of the tree to this node is the causeof this outcome. At any node of the tree, the outcome can be evaluated. If the
Conference Session
Developing and Establishing Graduate Study Programs - Graduate Studies Division Technical Session 2
Collection
2017 ASEE Annual Conference & Exposition
Authors
Janet Callahan, Boise State University; Cheryl B. Schrader, Missouri University of Science and Technology; Darryl P. Butt, University of Utah; Timothy Andersen; Tammi Vacha-Haase, Boise State University; Amy J. Moll, Boise State University
Tagged Topics
Diversity
Tagged Divisions
Graduate Studies
the emerging doctoral degree programs.IntroductionViewed as being essential to American technological research, manufacturing, and overalleconomic strength, the limited number of scientists and engineers with advanced degrees haslong been a concern for the country’s wellbeing. Science and engineering jobs have continued toincrease at a faster rate (18.7%) than all other occupations (14.3%), with 59% in computer andmathematical scientist occupations.1 The driving growth among science, technology, engineeringand math (STEM) occupations, has caused more than 1.1 million computer and mathematicaloccupations to be added between 2005-2015.2Although over 22,000 doctoral degrees are conferred yearly in the science and engineeringfields,3 questions
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, University of Detroit Mercy; Jiawen Wang, University of Detroit Mercy; Wenbing Zhao, Cleveland State University; Lei Wang, Anhui Polytechnic University
Tagged Divisions
Computing & Information Technology
University. Dr. Zhao has served on the organizing c American Society for Engineering Education, 2017 Paper ID #18254 committee and the technical program committee for numerous international conferences. Dr. Zhao is an Associate Editor for IEEE Access, an Academic Editor for PeerJ Computer Science, and is a member of the editorial board for International Journal of Parallel Emergent and Distributed Systems, International Journal of Distributed Systems and Technologies, International Journal of Performability Engineering, International Journal of Handheld Computing Research. Dr. Zhao is a senior member of
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Sreyoshi Bhaduri, Virginia Tech; Tamoghna Roy, Virginia Tech
Tagged Divisions
Computing & Information Technology
., & Leenaars, A. (2010). Suicide Note Classification Using Natural Language Processing: A Content Analysis. Biomedical Informatics Insights, 2010(3), 19-28. doi:10.4137/BII.S4706Robinson, C., Yeomans, M., Reich, J., Hulleman, C., & Gehlbach, H. (2016). Forecasting student achievement in MOOCs with natural language processing. Paper presented at the Proceedings of the Sixth International Conference on Learning Analytics & Knowledge.Savoy, J. (2015). Text clustering: An application with the State of the Union addresses. Journal of the Association for Information Science and Technology, 66(8), 1645-1654.Shi, C., Xu, C., & Yang, X.-j. (2009). Study of TFIDF algorithm. Journal of Computer
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Jeffrey Erin Cole, Acute Systems, LLC; Walter E Thain, Southern Polytechnic College of Engr and Engr Tech; Thomas Fallon, Southern Polytechnic College of Engr and Engr Tech
Tagged Divisions
Computing & Information Technology
Paper ID #12584Modeling Multi-Protocol Label Switching Networks in the LaboratoryMr. Jeffrey Erin Cole, Acute Systems, LLC Jeffrey Cole is a Master’s of Electrical Engineering Technology graduate from Southern Polytechnic State University. His research included various configurations such as basic MPLS, AToM, MPLS Layer 3 VPNs and MPLS Traffic Engineering. Other topics included network performance measurements, net- work time protocols and network traffic generator analysis. Undergraduate studies were completed at the University of Detroit Mercy in Computer and Information Science. He has over 9 years of experience in
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Roxanne Moore, Georgia Institute of Technology; Douglas Edwards, Georgia Institute of Technology; Jason Freeman, Georgia Institute of Technology; Brian Magerko, Georgia Institute of Technology; Tom McKlin, SageFox Consulting Group; Anna Xambo, Georgia Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Mathematics (STEM) educational researcher with the Georgia Institute of Technology. His educational experience in the Atlanta area for the past twenty years includes high school mathematics teaching, Math/Science Magnet Program Director, Title I educational data specialist, and Associate Professor of Information Technology. As a former US Air Force electronics engineer, Doug was also an engineering project manager.Jason Freeman, Georgia Institute of Technology Jason Freeman is an Associate Professor of Music at Georgia Tech. His artistic practice and scholarly research focus on using technology to engage diverse audiences in collaborative, experimental, and ac- cessible musical experiences. He also develops educational
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; John B. Southworth, East Carolina University
Tagged Divisions
Computing & Information Technology
Paper ID #16761The State of IPv6: Measuring Global AdoptionMr. John Pickard, East Carolina University Dr. Pickard is an Assistant Professor at East Carolina University in the College of Engineering and Tech- nology. He teaches undergraduate and graduate Information and Computer Technology (ICT) courses within the Department of Technology Systems. Dr. Pickard plays an active role in building positive and sustainable industry relationship between the college, local businesses, and industry partners. Current industry recognized certifications include; Cisco Certified Network Professional, Microsoft Certificated
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Di Ma, University of Michigan - Dearborn
Tagged Divisions
Computing & Information Technology
currently a visiting professor at UMTRI and an Associate Professor at the Computer and Information Science Department of the University of Michigan, Dearborn. She obtained her PhD degree from the University of California, Irvine in 2009. She also received a B.Eng. degree from Xi’an Jiaotong University, China and a M.Eng. degree from Nanyang Technological University, Singapore. She was with the Institute for Infocomm Research, Singapore (2000-05). She is a recognized expert with 10+ years of research experience in Computer/Network/Wireless and Mobile Computing/Data Storage security and privacy. She has extensive experience in designing mitigation techniques such as authentication, secure delegation and authorization
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Munish Sharma, Northern Illinois University
Tagged Divisions
Computing & Information Technology
. Remote ExperimentationThe lead author has been working on remote laboratory development and implementation for Page 23.807.3more than ten years. During this period, he has attracted research and development grants fromthe National Science Foundation and industries. Some of these developments are used to deliverlaboratory courses within an electrical engineering technology program. This section willprovide an outline of those developments.To maximize the benefit of remote laboratories, the facility design philosophy includes a numberof features: a) use of emerging technologies; b) individualized learning; c) knowledge-centeredlearning; d
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Namratha Siripragada, Northern Illinois University
Tagged Divisions
Computing & Information Technology
usage of the developed facility for a given period of time. Using the weekly surveymanagement feature an administrator can update the weekly survey questions and analyze the datagathered.Student level of access allows one to perform experiments, take part in ESM activity, and completeweekly survey. An image of the student home page provided in Figure 10. Figure 10: Shows the image of student account page5. Lesson learnedThe project evaluation blends various emerging technologies in an innovative manner to developand validate the remote laboratory facility while offering targeted laboratory courses. The facility is
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manaz Rusi Taleyarkhan, Purdue University; Oluwatosin Alabi, Purdue University, West Lafayette; Alejandra J. Magana, Purdue University, West Lafayette; Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
Paper ID #10184An Exploratory Survey on User Perceptions and Adoption of NEES.orgMiss Manaz Rusi Taleyarkhan, Purdue UniversityMrs. Oluwatosin Alabi, Purdue University, West Lafayette Oluwatosin (Tosin) Alabi is a graduate researcher in Computer and Information Technology. Currently, she is conducting research in High Performance Computing (HPC) and Data Analytics. Specifically, her research is focused on the use of parallel computational tools in supporting big data problem solving in bioscience and information technology. She holds a Masters in Computer and Information Technology, where her thesis focus on the role of com
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Janusz Zalewski, Florida Gulf Coast University; Andrew J. Kornecki, Embry-Riddle Aeronautical Univ., Daytona Beach; Bogdan Denny Czejdo, Fayetteville State University; Fernando Garcia Gonzalez, Florida Gulf Coast University; Nary Subramanian, University of Texas, Tyler; Dawid Trawczynski, Advanced Micro Devices
Tagged Divisions
Computing & Information Technology
issue specific to this module. Incase of a Java Security module, this part focuses on two aspects: message integrity and messageauthentication. An excerpt from the Introduction is presented below. Java technology has been a popular tool used to create many stand-alone, enterprise- class and embedded applications to meet the need of its customers. However, there is always a threat from hackers who attempt to invade and steal the important Page 24.346.6 information through any means of the data communication. The main problem when dealing with secure Java programs is securing data transfer between machines on a
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Iem Heng, New York City College of Technology; Farrukh Zia, New York City College of Technology, CUNY; Andy Zhang, New York City College of Technology
Tagged Divisions
Computing & Information Technology
, CET4811 requires students to integrate wired and wirelesscommunication as part of their comprehensive design project.1.1 Bluetooth SpecificationsBluetooth wireless technology is based on the IEEE 802.15 standard. Bluetooth was developedto replace the cables that connect desktop and portable computers, mobile phones, handhelddevices, computer accessories and peripheral electronic devices5. The information normallycarried by a cable is instead transmitted over the 2.4 GHz ISM (industrial, scientific and medical)frequency band, which is the same frequency band used by IEEE 802.11b/g/n wireless networks.The ISM band frequency range is 2.402-2.480 GHz.There are three output power classes for Bluetooth. The following Table 1 lists the maximumoutput