Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 61 - 86 of 86 in total
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; John B. Southworth, East Carolina University
Tagged Divisions
Computing & Information Technology
test is not a reflection of the protocols themselves butrather a byproduct of implementations and possibly routing policies along the packet paths.Figure 9. Example output from v6Sonar showing the results of a performance test towww.google.com from six globally distributed monitoring agents. The test performed was HTTPGet of Web content.Discussion of findingsCzyz et al’s 2014 study provided a model for assessing IPv6 adoption through the first at largeempirical study of the state of IPv6 adoption by analyzing ten different datasets and producingresults on twelve adoption metrics. Their study provided qualitative and quantitative evidencethat IPv6 “is being used natively for production and at a rapidly-increasing rate” 3. In this studywe
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mahmoud K. Quweider, University of Texas - Rio Grande Valley; Fitratullah Khan, University of Texas - Rio Grande Valley
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
results do not prove the superiority ofthe CBI compared to other traditional methodologies, the CBI approach did offer our students theframework and skills to bridge the gap between traditionally disparate sciences. The courseevaluations filled by students, and the reflective summary by the involved faculty, show manypositive improvements in attitude, independence, attendance, learning engagements, immersion,and mood. We also measured significant improvements in programming and problem solving,especially as it related to mathematics and physics, as well as in decision making.Some of the skills that CBI targeted were interpersonal skills, oral and verbal communications,and presentations.Acknowledgment:Part of this work was conducted while
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Di Ma, University of Michigan - Dearborn
Tagged Divisions
Computing & Information Technology
experience needs to blend into thecontext aware content. In addition, measurable goals and objectives that are challenge enough tostudents need to be counted.Standards. Standards of electronics and computer science curriculum and program goals must beinstilled and reflected to the projects. We need to consider the ABET requirement for thecomputer curriculum and program expectations. Overall, projects need to be developed byourselves to be authentic to students and local community. The research study is supported byNSF DUE program requirements are considered.In addition to the above project design issues, PBL carries the characteristics of pedagogicalunderpinnings.Innovation. Mobile computing is a new emerging area in computer science. Research
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Munish Sharma, Northern Illinois University
Tagged Divisions
Computing & Information Technology
) embedded assessment strategies; and e) scaffolds. These features provide anengaging laboratory experience, work with students’ pre-existing knowledge, and develop skillsof self-monitoring and reflection, which contribute toward improving the quality of STEMeducation. The project experimentation part of the facility has two major components: a) aremote laboratory and b) pedagogical design.3.1 Remote LaboratoryThis implementation proceeds through a number of inter-linked tasks covering a range ofdisciplines, which include computer interfacing, web design, interactive graphical user interface,computer networking, network/web security, experiment module designs, assessment strategy,and project evaluation.The developed facility can be presented by a
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Kansas State University; Eugene Y. Vasserman, Kansas State University; Eleanor C. Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
during the 1970s 9 . Since that time, the importance and need fora workforce skilled in cybersecurity has grown rapidly 17 . Due to this rapid growth, and thetremendous breadth of material that falls under the umbrella of cybersecurity, a wide array ofcontent and pedagogical practices have been incorporated into today’s cybersecurityclassrooms.While this diversity reflects the reality of cybersecurity education, it is a major hindrance to thedevelopment of a consistent model for cybersecurity education. Areas which could beincorporated into this domain, include: computer architecture, criminology/law, cryptography,databases, human-computer interaction, information retrieval, information theory,management/business, mathematics, military science
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Shaundra Bryant Daily, Clemson University; Juan E Gilbert, Clemson University; Wanda Eugene, University of North Carolina Charlotte; Christina Gardner-McCune, Clemson University; Kyla Alanna McMullen, Clemson University; Phillip Wendell Hall Jr, Clemson University ; Sekou L Remy, Division of Human Centered Computing - School of Computing, Clemson University; Damon Lamar Woodard, Clemson University; Tania Roy, Clemson University
Tagged Divisions
Computing & Information Technology
, these preferences are reflected in the top majors chosen by womenthat include business, health professions, education, history, psychology, visual and performingarts, communication, English language and literature, and liberal arts and humanities. In fact, theonly major considered more of a “hard” science that is among the top ten chosen majors isbiological/biomedical sciences. Even in the choice of biology-related fields; however, we see thedirect opportunity for graduates to realize impacts on people as compared to traditional computerscience research. Figure 2 shows the gender composition of college majors, while Figure 3shows the chosen occupations of men and women with STEM-related degrees
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alexander A. Kist, University of Southern Queensland
Tagged Divisions
Computing & Information Technology
Instruction, 2003. 13(2): p. 125-139.11. Sambrook, S., Factors influencing learners' perceptions of the quality of computer based learning materials. Journal of European Industrial Training, 2001. 25(2/3/4): p. 157-167.12. Killen, R., Effective teaching strategies : lessons from research and practice. 5th ed. 2009, South Melbourne, Vic.: Cengage Learning. x, 374.13. Department of Education, Queensland, Productive Pedagogies: Classroom reflection manual. 2002.14. Moebs, S.A., A learner, is a learner, is a user, is a customer: QoS-based experience-aware adaptation, in Proceeding of the 16th ACM international conference on Multimedia. 2008, ACM: Vancouver, British Columbia, Canada. p. 1035-1038.15. Reichl, P., B
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; James R. Lewis, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
newhigh school graduates, student retention, getting them engaged, and enhancing their skill-set. BillGates has rightly said, “Our current expectations for what our students should learn in schoolwere set 50 years ago, to meet the needs of an economy based on manufacturing and agriculture.We now have an economy based on knowledge and technology.”For today’s students, classrooms are not the only form of learning space. They are goal oriented,prefer multitasking, learning in social contexts, and thrive on smart phone app Objective-C is anelegantly reflective language based on C with added Smalltalk style object oriented conceptswhich optimizes Model-view-Controller (MVC) software architecture. It is often used in tandemwith a fixed library of
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Namratha Siripragada, Northern Illinois University
Tagged Divisions
Computing & Information Technology
, and Mathematics) project, award number DUE-1140502. Any opinions, findings, and conclusions or recommendations expressed in this materialare those of the authors and do not necessarily reflect the views of the National Science Foundation.References[1] Elliott, S. and Kukula, E. (2007), The Challenges Associated with Laboratory-Based Distance Education, EDUCASE Quarterly, pp. 37-42.[2] Saleem, A. I. and Al-Aubidy, K. M. (2008), Mixed Reality Environment for Web-Based Laboratory Interactive Learning, International Journal of Online Engineering, 4(1), pp. 40-45[3] Gomes, L. and Bogosyan, S. (2009). Current Trends in Remote Laboratories, IEEE Transactions on Industrial Electronics, 56(12), pp. 4744-4756.[4] García
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
MD B. Sarder, University of Southern Mississippi
Tagged Divisions
Computing & Information Technology
third tier of the application is available to the students and it increases their interaction withthe instructors (Student Interaction Tier). The MOD has two features. The first feature was basedon a question/answer repository (database) related to material covered in specific lectures. Thisrepository works in conjunction with the recorded lectures to serve as an interactive feedbackmechanism to ensure proper viewing as well as improve understanding of the lecture material.The second feature was to extract specific events from each recorded lecture. These eventscorrespond to interactions between students and instructor in a live lecture setting. The benefitsof extracting these interactions will reflect on current and future students
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Hassan Rajaei, Bowling Green State University; Eman A. Aldakheel, Bowling Green State University
Tagged Divisions
Computing & Information Technology
 ultimately uses IaaS utilities. In addition, the project identified different levels of difficulties in courses to explore more than one layer of cloud services.  Figure 4: The proposed CBE­CS architecture mapping Computer Science courses to the  Cloud architecture (courses appearing in multiple layers have different levels). Moving  from  the  SaaS  layer  to  the  PaaS  reflects  the  increase  in  the  depth,  difficulty,  and complexity of a course. Likewise, the move from PaaS to IaaS indicates complexity of a course  Page 25.318.8with  respect  to  the  needs  for  details  in  VM  configuration,  networking
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Secil Caskurlu, Purdue University; Iryna Ashby, Purdue University; Marisa Exter, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Proceedings of the 45th ACM Technical Symposium on Computer Science Education (pp. 355-360). ACM.15 Exter, M., & Turnage, N. (2012). Exploring experienced professionals’ reflections on computing education. ACM Transactions on Computing Education (TOCE), 12(3), 12.16 Lethbridge, T. C. (2000). What knowledge is important to a software professional? Computer, 33(5), 44-50.17 Andriole, S. J. and Roberts, E. (2008). Technology curriculum for the early 21st century. Retrieved from http://cacm.acm.org/magazines/2008/7/5359-point-counterpoint- technology-curriculum-for-the-early-21st-century/fulltext 21Formal
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tamer Omar, East Carolina University; Philip J. Lunsford II, East Carolina University
Tagged Divisions
Computing & Information Technology
resources, lab materials (questions templatesand manual), operating systems, software applications and programs are required at least everytwo years. Due to the continuous advancement of technology, the different resources, systems andtools used to implement the network security lab environment must be regularly reviewed to ensurethat the lab environment reflects the current technology used in industry.The rest of the paper is organized as follows. In section two a background about the lab modelincluding lab structure, components, lab support system and the tools used are presented. Sectionthree demonstrates the evaluation methodology. Analysis of the student survey, and feed-backregarding their lab experience during the course and the lessons
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Northwest Missouri State University; Eugene Vasserman, Kansas State University; Eleanor C Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
courses if those courses fit intotheir schedule and academic requirements. This interest was expected given that the students wereenrolled in an upper-division elective course.Over the course of the three interviews, students’ responses showed low self-efficacy levels whenasked about performing various cybersecurity related tasks, with comments such as “I’m not sureI could do that” being common. Meanwhile interest levels seemed to grow, reflected in commentssuch as “That was really cool!”. For some students, self-efficacy levels decreased over the courseof the semester. Given that students admitted to having very little knowledge of cybersecurity atthe beginning of the semester, this was not totally unexpected as students became aware of
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Natascha M. Trellinger, Purdue University, West Lafayette; Rebecca R. Essig, Purdue University, West Lafayette; Cary D. Troy, Purdue University, West Lafayette; Brent K. Jesiek, Purdue University, West Lafayette; Josh Boyd, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
profession, yet it israrely included in sophomore and junior level courses. Reflecting on our own prior efforts todevelop writing assignments for such courses, we became curious about the extent to which themost popular engineering textbooks include writing prompts and related writing activities. Thisquestion seemed particularly important given that textbooks often play critical roles inengineering curricula and courses. Textbooks often influence how courses are structured, andreading assignments and homework problems are frequently assigned directly from textbooks.In this project, we systematically searched for and analyzed writing-based problems in sixpopular fluid mechanics textbooks, with a focus on chapters with similar technical content
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Simin Hall, Virginia Tech; Clifford A. Shaffer, Virginia Tech; Eric Fouh, Virginia Tech; Mai Hassan ElShehaly, Virginia Tech; Daniel Breakiron, Virginia Tech
Tagged Divisions
Computing & Information Technology
lead students to reflecting on their errorsprior to resubmission because they lose points for wrong responses. This makes guessing ineffec-tive. Our proficiency exercises are modeled after the TRAKLA system5, 14 and implemented us-ing the JSAV algorithm visualization library15.3. Research MethodsWe viewed this study as the first step in assessing our overall approach. Our goal was to make asmuch progress as possible on answering a number of key questions.  Can students learn as well or better using interactive tutorials instead of traditional lecture and textbook?  Will students be accepting of a class focused on interactive tutorials rather than tradition- al lecture and textbook?  Will our client/server
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Maurice F. Aburdene, Bucknell University; Marie Catherine Pizzorno, Department of Biology, Bucknell University; Alexander P Thompson, Bucknell University
Tagged Divisions
Computing & Information Technology
? How many possible triplets are there? How many amino acids are there? Whyis there a difference in these numbers? What is a start codon? What is a STOP codon? What dowe mean by gene regulation? What governs the rate of activation of genes?g) Databases. Where are the data bases located? What is the National Institute of Health? Whosupports it? What does NCBI refer to?h) Character strings described by Numerical Sequences. How do we change a string to anumerical sequence? How do we represent the DNA sequence of length N? How would werepresent the complementary DNA sequence?i) Assume we used the complex conjugate notation of a, t, g, and c. What would be the sum of aand t? Reflecting on our class work? What would be the sum of a DNA sequence?j) A
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Naser El-Bathy P.E., North Carolina A&T State University; Clay Samuel Gloster Jr., North Carolina A&T State University; Ghassan M. Azar; Cameron Seay, North Carolina A&T State Univeristy; Mohammed K. El-Bathy, Lawrence Technological University; Ibraheem A. Kateeb, North Carolina A&T State University; Rajeev K. Agrawal, North Carolina A&T State University; Aiman Ghassan Baset
Tagged Divisions
Computing & Information Technology
studentsreceived job offer. Figure 6 Number of jobs offered to the studentRelated workPrevious work in data clustering has focused on concepts similar to Intelligent Clustering BasedExtended Genetic Algorithm. K-means is most successfully used on data sets because of itssimplicity and its linear time complexity. However, it is not feasible to be used on large data sets.Hierarchal clustering algorithm creates a structure that reflects the order of divided groups. Itgives better results than K-means if it uses random data set. A GA-based unsupervised clusteringtechnique selects cluster centers directly from the data set and allows acceleration of the fitnessevaluation via a look-up table. A limitation of existing techniques is
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Rob Elliott, Purdue University School of Engineering and Technology, Indiana University Purdue University at Indianapolis
Tagged Divisions
Computing & Information Technology
language and models. This type of learning can easily bedone independently through the use of learning activities. Another consideration is that thecourse focuses on iterative and incremental improvement in the proposed software models.Review, revision, and improvement are key components of any modeling process and aredifficult to accomplish within the confines of a single weekly deliverable. Finally, the mostinvigorating element of this flipped course is the abundance of class time it provided forcollaborative activities and peer learning, which is reflective of how the systems analysis anddesign process is conducted in a real world environment. The development of a rich classroomenvironment was a fundamental goal of the author’s flipped
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Barbara E. Brazon, Penn State University; Mary Lynn Brannon, Pennsylvania State University, University Park
Tagged Divisions
Computing & Information Technology
client sign off, was not achieved, the students were forced to return the current phase ofthe project and make necessary modification to the deliverables that reflected the requirements asstipulated and reiterated by the client at the meeting. Communication and access to the client bythe students was a critical and guiding force in the successful implementation of the final productand implementation of the Fast Track Process Phase Construction process..Presentations Page 22.1605.6Each team was required to give a brief oral presentation to the current managers. The managerand key group members met with the clients every two weeks to report the
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University
Tagged Divisions
Computing & Information Technology
developments and their implementation outcomes. Page 22.1002.6Design PhilosopyTo maximize the benefit of remote laboratories, the design philosophy includes a number offeatures: a) use of emerging technologies; b) individualized learning; c) knowledge-centeredlearning; d) embedded assessment strategies; and e) scaffolds. These features provide anengaging laboratory experience, working with students pre-existing knowledge, anddeveloping skills of self-monitoring and reflection, which contribute toward improving thequality of STEM education.Design ImplementationsMost of the implementations are done through two NSF grants (DUE-044xxxx and DUE-083xxxx). This
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Ibraheem A. Kateeb, North Carolina A&T State University; Larry Burton, North Carolina A&T State University; Naser El-Bathy P.E., North Carolina A&T State University; Michael S. Peluso, North Carolina A&T State Univerisity
Tagged Divisions
Computing & Information Technology
issuessuch as radio frequency interference, high attenuation, noise interference and data securityconcerns. B- High Temperature Superconductor (HTS) and the Smart GridIn the way that fiber optic technology revolutionized the telecommunications industry with itspotential for zero loss due to total internal reflection, the electrical industry is undergoing just as Page 25.1300.9significant revolution with a new cable type based upon High Temperature Superconductor(HTS) technology. In a traditional copper or aluminum energy cable electrons move at randomand lose energy in collisions as the collisions generate heat. In a HTS cable electrons move
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Abdulwaheed Johnson, Pace University; Anthony Joseph, Pace University
Tagged Divisions
Computing & Information Technology
andStarbucks applications. Most of the interviewees touted the efficiency of these mobile paymentapplications, as well as the targeting of deals and customer rewards as attractive features, butwhen asked why they do not use these applications their answers ranged from inconvenience,uncertainty regarding the benefits of the payment platform, and mistrust of the platformregarding privacy of their personal information. It is noteworthy, that the privacy of personalinformation is a factor that encourages adoption in the NFC platform, but discourages adoptionof online mobile payment platforms. This is reflected in Figure 5 which shows that adopters ofNFC payment and cash payments are more sensitive towards disclosure of PII with a scoresignificantly above
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Emre Tokgoz, Quinnipiac University
Tagged Divisions
Computing & Information Technology
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Tanner Lund, Brigham Young University; Hayden Panike; Samuel Moses, Brigham Young University; Dale C Rowe, Brigham Young University; Joseph J Ekstrom, Brigham Young University
Tagged Divisions
Computing & Information Technology
views that enable users to search and make the data meaningful.This event cycle3 reflects the processes involved in turning events and their logs into usefulinformation, regardless of the implementation.Further System ExplanationThe core of this methodology utilizes search or data mining technologies. There are many toolsthat provide the ability to analyze large amounts of data and produce usable information. Toolscurrently available include: Splunk4, Apache Solr, and Elasticsearch Foundations’ ELK stack(Elasticsearch, Logstash, and Kibana). Each of these tools has the ability to take textual data andparse it into desired fields of information. For the purpose of this paper, we will be using theELK stack as our software of choice.Our
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University (ENG); Charles Richard Cole, Southern Polytechnic State University; Christopher Welty, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
provide a central location for game assets. Also, the web presence helped to maintaina constant visual “brand” as the collaborative passed from one semester to the next with new de-signers entering the collaborative as others graduated.This ongoing collaboration is intended to examine the design and production process of each dis-cipline, observe and reflect on the efficacy of that process and seek that interstitial area betweenthe two disciplines - the "overlap" - and make meaningful reform to the next collaboration. Aftertwo semesters, from fall 2012 to spring 2013, the faculty and student collaborators found sub-stance in the overlap, frustrations in the process and sufficient value in the effort and product tojustify continuing the