AC 2009-677: REMOTELY RECONFIGURABLE, SECURE WIRELESS MESHNETWORK FOR BIDIRECTIONAL DATA COMMUNICATIONAkram Hossain, Purdue University, Calumet Akram Hossain, Purdue University-Calumet Akram Hossain is a professor in the department of Electrical and Computer Engineering Technology at Purdue University Calumet, Hammond, IN. He worked eight years in industry at various capacities. He is working with Purdue University Calumet for the past 21 years. He consults for industry on process control and related disciplines. He is a senior member of IEEE. He served in IEEE/Industry Application Society for the past 15 years at various capacities. He served as chair of Manufacturing Systems Development
, and Consultant Engineer. Dr. Najafi taught at Villanova University, Pennsylvania, and was a visiting professor at George Mason University and a professor at the University of Florida, Department of Civil and Coastal Engineering. He has received numerous awards, such as Fulbright scholarship, teaching awards, best paper awards, community service awards, and admission as an Eminent Engineer into Tau Beta Pi. The Florida Legislature adopted his research on passive radon-resistant new residential building construction in the HB1647 building code of Florida. Najafi is a member of numerous professional societies and has served on many committees and programs; and continuously attends and presents refereed papers
–questionnairehad a 7–point Likert scale response from “Strongly Disagree” to “Strongly Agree.” Once thedata was collected, the average for each item was calculated. Results of the learning stylequestionnaire verified that the engineering students are strong visual learners. Two of theparticipants are shown to have preference on visual learning. Participant 3’s response showed hewas both a visual and auditory learner.Figure 14 summarizes the results on the technology acceptance model (TAM). The results of theTAM model questionnaire are presented, in terms of each of its components, in the followinglist: 1. Perceived Usefulness: Unlike participants 1 and 3, participant 2 did not have any previous practical experience with control design
University, as an Associate Professor in 2000. In 2005 he joined the University of California, Davis, where he is a Professor in the Department of Chemical Engineering and Materials Science and also a member of the Computational Science and Engineering Center. Prof. Asta's research interests are in computational materials science, focusing on the development and application of atomistic and first-principles methods for simulating thermodynamic and kinetic properties of complex multiphase bulk materials, surfaces and interfaces. Page 11.1356.1© American Society for Engineering Education, 2006 Ultra
published over a dozen papers in cyber-security. c American Society for Engineering Education, 2016 A Call to Arms: Defending Against Point of Sale MalwareAbstract - Point of Sale (PoS) malware has been alarmingly successful over the past year and isestimated to have cost businesses billions of dollars. While PoS malware does not represent anymajor technical evolution, it suggests that cybercrime is shifting focus from the consumer to theretailer. Rather than relying on infecting relatively small groups of users with specificvulnerabilities who may conduct e-commerce a few times per month, PoS malware is able totake advantage of standardized point-of-sale
Reconfigurable Distribution Automation and Control Laboratory: A Network Reconfiguration Experiment for Load Balancing and Loss Reduction in Power Distribution Systems Xiaoguang Yang, Valentina Cecchi, Karen Miu, Chika Nwankpa Department of Electrical and Computer Engineering Drexel University Philadelphia, PennsylvaniaAbstract – At Drexel University, a network reconfiguration experiment has been developed toprovide students with hands-on experience on how to balance loads and reduce real power lossesof a distribution system through network reconfiguration. The experiment has been set up withinDrexel’s Reconfigurable
DEBATES- A TOOL FOR EFFECTIVE EGAGEMET OF STUDETS Robert M. Brooks and Amithraj Amavasai Abstract The authors have been continuously fascinated by the role of debates in effective engagement of students. Debates have been well recognized as a valuable tool for the assessment of educational objectives. In the Fall 06 semester, debates were used as a tool for learning the subject in an environmental science course, C010- Environmental Science. Students were asked to make handwritten notes while the debates were on progress. There were six debates in the course. The final examination contained conceptual questions, including the contents of the debates. Except for
demographic methods and a concentration in social statisticDr. Emily Knaphus-Soran, University of Washington Emily Knaphus-Soran is a Senior Research Scientist at the Center for Evaluation and Research for STEM Equity (CERSE) at the University of Washington. She works on the evaluation of several projects aimed at improving diversity, equity, and inclusion in STEM fields. ©American Society for Engineering Education, 2024 Logic Models: How this tool can help you make the case for your DEI programs CoNECD 2024 Dr. Liz Litzler (she/they) Dr. Erin Carll (she/her) Dr. Emily Knaphus-Soran (she/her)Hello, we are happy to be sharing with you about how logic models may be helpful for you.We are
difficulty imagining how the system response would changeif one of the input parameters (mass, stiffness, damping, frequency of applied force, etc.) isincreased or decreased. The manner that we decided to address this deficiency was to createinteractive simulation modules (ISMs) in MATLAB that incorporate one or more of thesubcategories shown in Figure 1 in a simple demonstration and allow for the input parameters tobe modified by the user. Figure 1. Basic topics covered in a typical Vibrations courseThe framework of employing simulation modules as a learning tool is based on the fact thatmuch of the research in engineering education suggests that most engineering students are visual(as opposed to verbal) learners [2-3
course is taken by second-semester sophomorestudents, along with a corequisite laboratory course and an additional 11 engineering credits. Thegeneral purpose of both of the latter course designs attempted was to give students an impetus toremain current with the course material. The method with daily quizzes asked about current andvery recent material for this reason. The course setup using biweekly exams allows for studentsto refresh their memories on a smaller portion of the course material (about 14%, rather than 30%),and to refresh material that was introduced more recently.Spring 2015 Mid-Atlantic ASEE Conference, April 10-11, 2015 Villanova UniversityMethodology and AssessmentThere are several metrics by which the relative effectiveness of
emerging technologies in undergraduate teaching. She has developed curriculum for business education and information technology at the secondary, post-secondary, undergraduate, and graduate levels. Page 15.150.1© American Society for Engineering Education, 2010 An Experience with Cloud Computing in the ClassroomIntroductionCloud computing is a general term for shared applications and infrastructure provided by anexternal service provider and paid for on a pay-per-use basis. For enterprise computing based ona business model that relies heavily on in-house computing infrastructure, the cloud concept hasmajor
Technical Information Graphically for Improving Learning Competencies Paper presented at 2019 ASEE Annual Conference & Exposition, Tampa, Florida. https://peer.asee.org/32310[6] Jurowski, K., Jurowska, A., & Krzeczkowska, M. (2015). Comprehensive review of mnemonic devices and their applications: State of the art. International E-Journal of Science, Medicine & Education, 9(3), 4–9.[7] Berg, T., & Pooley, R. (2013). Contemporary Iconography for Rich Picture Construction. Systems Research & Behavioral Science, 30(1), 31–42. doi:10.1002/sres.2121.[8] Diehl, E. J. (2018, June), Using Cartoons to Enhance Engineering Course Concepts Paper presented at 2018 ASEE Annual Conference & Exposition
. ©American Society for Engineering Education, 2024 A Combat Action Video Goes ViralIntroductionOn 24 February 1991, the USS Missouri (BB-63) was conducting shore bombardment operationsin the Persian Gulf off the coast of Kuwait during Operation Desert Storm. The gun fire controlequipment of the forward main battery plotting room was energized and ready for action. Thecrewmembers assigned to the plotting room were mostly relaxed and confident, having alreadyhad many hours of training and wartime fire missions under their belts. Suddenly, a voice on theship’s loudspeaker announced, “Missile Inbound!” and the crew immediately “braced for shock”as a deadly Silkworm anti-ship missile streaked towards the Missouri and its
software can detectand reconstruct Attack II in the following way. 1). The tracking software continuouslyexamines the fingerprints located in the system and compare them with the sensitivefingerprints stored in the evidence model repository. 2). Once sensitive fingerprints match theincident identifier of Attack II, Attack II is identified. 3). All fingerprints of Attack II will beidentified, located, and retrieved based on the contexture information defined in the evidencetree of Attack II. 4) The retrieved fingerprints will be correlated to reconstruct Attack II.5.2. Educational Activities EnabledMany undergraduate and graduate students have been involved in the research partiallypresented in this paper. The students will conduct security design
student’s feedback on methods they may be using to stay engaged. Fig. 4 Student responses to learning-gain during 75-minute sessions with interruptions References [1] Prince, M., “Does Active Learning Work? A Review of Although the ICAs assigned in the statics course the Research,” Journal of Engineering Education, Vol 93,involved working on a problems very similar to those that 2004, pp. 223-231one might get in a pop-up quiz, since it had no direct [2] Hartley, J., and Davies, I., “Note Taking: A Criticalimpact on grades, students approached these assignments
system design and optimization. Dr. Sexton holds B.S., M.S., and Ph.D. degrees in Mechanical Engineering from Virginia Tech. Page 11.809.1© American Society for Engineering Education, 2006 Interactive Computer Program for Enhancing Conductive Heat Transfer ConceptsAbstractA computer based interactive learning tool for students enrolled in the Heat and Mass Transfercourse for undergraduate students was developed. The program is based on a code developedthrough a private contract with Sandia National Laboratory for steady state and transient heatconduction in solids. The interface, which
University at Harrisburg. Page 13.16.1© American Society for Engineering Education, 2008 A Color Image Merging Algorithm Using MATLAB Eric Boyer and Aldo Morales Electrical Engineering Program Penn State Harrisburg Middletown, PA 17057Abstract:Students in the Electrical Engineering program at Penn State Harrisburg have manyopportunities to apply their acquired knowledge through hands-on course projects andlaboratory experiences in electronics, digital and image processing, VLSI, power andother courses, in addition to their capstone
. Anderson, Clemson University Rachel Anderson recently earned her PhD in Engineering and Science Education from Clemson Univer- sity. She is now the Assistant Coordinator for Clemson’s Peer-Assisted Learning (PAL) program. Her research interests include cross-disciplinary teamwork, student development, and program assessment. Rachel received a M.S. in Mechanical Engineering from Clemson University and a B.S. in Physics from Baldwin-Wallace University.Laurel Whisler, Clemson University Laurel Whisler is Assistant Director and Coordinator of Course Support Programs in Clemson Univer- sity’s Westmoreland Academic Success Program. In this capacity, she provides vision and direction for the Tutoring and Peer-Assisted
Bob's signature. In the Verification phase, Alice obtains 2011, pp. 1-6. [9] L. Xin and F. Dengguo, "Quantum digital signature based on|P> and |T> by encrypting Sb using Kab. If |P’> is fake quantum one-way functions," in Advanced Communicationinformation of Bob. when Trend finds |P> = |P’> and |ψp> = Technology, 2005, ICACT 2005. The 7th International for design and verification. He has published more than two hundred and fifty Conference on, 2005, pp. 514-517. research papers in international journals and
Paper ID #34347Computing Ethics for the Ethics of ComputingDr. Robin K. Hill, University of Wyoming Dr. Hill is an adjunct professor in both the Wyoming Institute for Humanities Research and the Phi- losophy Department of the University of Wyoming, and a Lecturer in Computer Science. She currently writes a blog on the philosophy of computer science for the online Communications of the ACM. Her teaching experience includes logic, computer science, and information systems courses for the University of Wyoming, University of Maryland University College (European Division), State University of New York at Binghamton
AC 2007-1286: PLANNING A SMALL-SCALE WIND-ELECTRIC SYSTEM INEAST-CENTRAL IOWAMichael E. Hay, University of Northern Iowa Michael Hay completed his masters degree in Industrial Technology at the University of Northern Iowa. Mr. Hay holds a BT in Industrial Technology/Mechanical Design from the University of Northern Iowa and an MA in Industrial Technology from the University of Northern Iowa. Mr. Hay has over 25 years of experience in various Engineering positions and is listed on six US patents. His graduate research was in planning small-scale wind-electric systems. He has worked on several other renewable energy and electric vehicle projects as well.Recayi "Reg" Pecen, University of
field.BYOP also works at the level of changing the learning objects that are seen within a CS program[17], and could have an impact on the overall culture of a program. Research suggests thatassignments and learning methods that can function as “equalizers” can have great valueparticularly when it comes to addressing the gender gap[3].BYOP naturally brings out the creativity of individuals and showcases how creative the field isand how creative it can be. Early, somewhat informal, exposure to the design process andalgorithm development process also shows students that the field is a lot more than simplyprogramming and that programming simply allows practitioners to implement their solutions anddesigns. In turn, that can open students up to ideas of
advice on improving student chapters. Incorporating these features with theresources targeted toward new student chapters, we envision the student chapter portion of theASEE website as a rich information source for both new and established student chapters.In addition to facilitating communication, the national ASEE organization can also help equipstudent chapters to promote engineering education by providing strategic resources. Oneexample of this is the existing visiting lecturer program. ASEE maintains a list of speakers whocan present at student chapter events, and ASEE also provides partial subsidies to help studentchapters pay for these speakers. Given the potential value of this resource, ASEE should betterpublicize the visiting lecturer
Session 1532 Teaching Genetic Algorithms with a Graphical User Interface Gregory J. Toussaint, Daniel J. Pack, and Randy L. Haupt United States Air Force Academy Abstract - Over the past several years, genetic algorithms have emerged as a powerful tool forsolving optimization problems in engineering. Genetic algorithms model biological evolution on thecomputer using the principles of natural selection, mating and mutation. Although the subject has beenpredominantly studied at the graduate level, undergraduate students can easily master the concepts. We
of Science in Electrical Engineering from Bangladesh University of Engineering and Technology. My research interests are deep learning and computer vision. c American Society for Engineering Education, 2020 A Real-Time Attendance System Using Deep Learning Face Recognition Weidong Kuang, and Abhijit Baul, University of Texas Rio Grande Valley Abstract Attendance check plays an important role in classroom management. Checking attendance bycalling names or passing around a sign-in sheet is time-consuming, and especially the latter is opento easy fraud. This paper presents the detailed implementation of a real-time attendance checksystem based on
Paper ID #26873Data Mining Course in the Undergraduate Computer Science CurriculumDr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science Department at Utah Valley University, Orem, Utah. He received his M.S. and Ph.D. in Computer Science from the University of Oklahoma, Norman, Oklahoma. His research focuses on diverse areas such as: Database Design, Data Structures, Artificial Intelligence, Robotics, Computer Aided Manufacturing, Data Mining, Data Warehousing, and Machine Learning.Kailee Parkinson, Utah Valley University I am a student at Utah Valley University majoring
planning toadd sustainable site and water efficiency to our current curriculum. The traditional hydrauliccourse has been teaching in state college did not include the sustainability. In this course we areimplementing the Leadership in Energy and Environmental Design (LEED) criteria. There aresix categories for LEED credit. We are including part of subcategory 6 from Sustainable Sitescategory. Subcategory 6 includes Stormwater design management both for quality and quantitycontrol. Limit disruption of natural hydrology by reducing impervious cover, increasing on siteinfiltration and managing stormwater runoff moreover using rational method to estimate runoffwill be covered from subcategory 6. In addition we will consider the strategies of project
., Ankara in 1968 and1970, respectively. He did further graduate work at Case Western Reserve University, Cleveland, Ohio between 1970and 1975 and received M.S. and Ph.D. degrees in Electrical Engineering and Applied Physics. He is currently a fullprofessor of Electrical Engineering at the University of Southern Maine. Prior to joining U.S.M. he served on thefaculties of M.E.T.U., Ankara, Turkey and the University of Pittsburgh. His research interests and publications span thefield of microelectronics including I.C. design, MEMS and semiconductor technology and its application in sensordevelopment, finite element and analytical modeling of semiconductor devices and sensors, and electronicinstrumentation and measurement
. He has taught circuit design at SUNY Stony Brook and Columbia Univer- sity NY City. Dr. Prodanov is co-recipient of the Best Poster Paper Award at the 2006 IEEE Custom Integrated Conference and his doctoral work has been recognized in 1997 by Stony Brook Chapter of Sigma Xi with Excellence in Research Award.Taufik Taufik, California Polytechnic State University Page 22.1335.1 c American Society for Engineering Education, 2011 Student Perception of Lecture Video Use as a Means to Increase Time for in Class Problem Solving ApplicationsAbstractThe purpose of this study
received his Ph.D. in Genomic Signal Processing from the Department of Electrical and Computer Engineering at Texas A&M University. The algorithms proposed by Dr. Gargari for solving discrete and continuous optimization problems have been used in different areas of science and engineering, and in several thousand projects in academia and industry. His research interests include Artificial Intelligence, Evolutionary Computation, Pattern Recognition, Error Estimation, and Proteomics.Lu Zhang © American Society for Engineering Education, 2022 Powered by www.slayte.com Multi-Semester Course Staffing Optimization Mudasser F. Wyne