Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 91 - 120 of 237 in total
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Maurice F. Aburdene, Bucknell University; Kundan Nepal, Bucknell University
Tagged Divisions
Computing & Information Technology
laboratoryprojects.Each laboratory project was discussed first in class and students were assigned homeworkbased on the project, followed by 3 hour lab to improve their understanding of the majorconcepts. Students wrote project reports (learning by writing).The relevant learning goals for the course addressed by these two projects are to develop theability to: a. identify and use signal models, b. develop models of engineering systems, physical systems, and social systems, c. analyze continuous-time system models by applying Fourier methods, and frequency response methods, d. develop computer models using available software packages for analysis and design, and e. communicate laboratory and project
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Munish Sharma, Northern Illinois University
Tagged Divisions
Computing & Information Technology
. Remote ExperimentationThe lead author has been working on remote laboratory development and implementation for Page 23.807.3more than ten years. During this period, he has attracted research and development grants fromthe National Science Foundation and industries. Some of these developments are used to deliverlaboratory courses within an electrical engineering technology program. This section willprovide an outline of those developments.To maximize the benefit of remote laboratories, the facility design philosophy includes a numberof features: a) use of emerging technologies; b) individualized learning; c) knowledge-centeredlearning; d
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Norman Pestaina, Florida International University; Tiana Solis, Florida International University; Peter J. Clarke, Florida International Univeristy
Tagged Divisions
Computing & Information Technology
Objectivesevolve. To complete the program of study for the BS-CS, every student will a) Demonstrate proficiency in the foundation areas of Computer Science including discrete structures, logic and the theory of algorithms. b) Demonstrate proficiency in various areas of Computer Science including data structures and algorithms, concepts of programming languages and computer systems. c) Demonstrate proficiency in problem solving and application of software engineering techniques. d) Demonstrate mastery of at least one modern programming language and proficiency in at least one other. e) Demonstrate understanding of the social and ethical concerns of the practicing computer scientist. f) Demonstrate the ability to work cooperatively in teams. g
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona; Simin Shoari; Behdad Kavianpour, University of California, Irvine
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
+ √y 2 =1 ( ab b2 −y 2 ) ( cb b2 −y 2 ) 2 x2 A2 + By 2 = 1 where √ √ A = ab b2 − y 2 , B = cb b2 − y 2 2 2 The elliptic disk Ax 2 + By 2 = 1 has the area of πAB. Thus the secondmoment with respect x − z plane, mxz , can be calculated as follows: +∞ +∞ +∞ +b mxz = y 2 dxdydz = πABy 2 dy = −∞ −∞ −∞ −b 2acπ +b
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University
Tagged Divisions
Computing & Information Technology
courses as a part of a regular curriculum. Experiences from these courseofferings will also be presented.2. Shortcomings of Internet Accessible Remote LaboratoryWhat are the issuesAs mentioned in the introduction section, researchers are pursuing this problem in an abruptmanner and are not yet coming up with a sustainable solution that can popularize the use ofremote laboratories. The major issues are: a) Integration of a number of disciplines into remote experimentation design; b) Modularity in designs; c) Readily available commercial products; d) Integration of learning management system; e) Maintenance and training; f) Administrative awareness and support; and g) Industry applications.a) Integration of a number of disciplines into
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona; Behdad Kavianpour, University of California, Irvine
Tagged Divisions
Computing & Information Technology
and(ρ,θ) is illustrated in Figure 1. A straight line in the plane is uniquely specified by two parameterssuch as (a, b) in the Cartesian space (a and b represent slope and intercept respectively), or (ρ, θ). Inthe polar (parameter) space where ρ is the length of the line segment from the origin perpendicularto the line, and θ is the angle that the line makes with the positive x axis, measured clockwise. Themost commonly used coordinate system in the Hough Transform implementation is (ρ, θ). With nimage points, the ranges of (ρ,θ) can be taken to be ρ: [−M, M ] and θ: [−π, π] where M depends onthe image size. If we restrict θ to be in [0, π] range, then normal parameters for the line will beunique. With this restriction, every line in the x
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing & Information Technology
care, physicians can predict the future of a bacterial infectionor an allergic reaction. These types of sequences are harmful and need to be brought to anend as soon as possible. To do so, physicians recommend necessary treatments toterminate these undesirable sequences.Implementation ModelA multiway lexicographic search tree can be used to represent event sequences where anevent from the sequence of events determines a multiway branch at each step. If thesequence is constructed from the English alphabets, at the root of the tree there are 27possible branches. Similarly, there are 27 braches for each subsequent node of the tree.For the sake of simplicity, assume we have a text that its words are constructed from theletters a, b, and c. The
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Camilo Vieira, Eafit; Alejandra J. Magana, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
cyberinfrastructure, computation, and computational tools and methods to: (a) leverage the understanding of complex phe- nomena in science and engineering and (b) support scientific inquiry learning and innovation. Specific efforts focus on studying cyberinfrastructure affordances and identifying how to incorporate advances from the learning sciences into authoring curriculum, assessment, and learning materials to appropriately support learning processes. Page 23.301.1 c American Society for Engineering Education, 2013 Colombian Elementary Students’ Performance and Perceptions of
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Natascha M. Trellinger, Purdue University, West Lafayette; Rebecca R. Essig, Purdue University, West Lafayette; Cary D. Troy, Purdue University, West Lafayette; Brent K. Jesiek, Purdue University, West Lafayette; Josh Boyd, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
: Explanation 13 7 3 3 6 0 30.2% of a concept (3. b.) Conceptual: Identification 9 3 4 4 1 2 21.7% of a concept (3. c.) Total Writing Prompts in Chapter/Total End- 44/148 14/112 18/135 14/207 9/42 9/90 of-Chapter Problems Percentage of problems with 29.7% 12.5% 13.3% 6.8% 21.4% 10.0% writing prompts (%)a Total writing prompts: 44+14+18+12+9+9=106. Relative % given as sum of found promptsdivided by 106.Textbook Summaries and AnalysisAs part of our analysis, the research team also examined each textbook for features
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Sreyoshi Bhaduri, Virginia Tech; Tamoghna Roy, Virginia Tech
Tagged Divisions
Computing & Information Technology
0.03022093 scholarship 0.030290559 graduate 0.028531669 leadership 0.028049867 innovation 0.028128905 learning 0.02741647 global 0.027577932 interdisciplinary 0.027188976 leadership 0.027501058 quality 0.027041394 service 0.027494654 address 0.026898937 education 0.026526552Figure 1 shows a bar diagram plotting the tf-idf scores of the top 5 tokens of Private (Fig. 1-a)and Public (Fig. 1-b) schools. To facilitate comparison, the corresponding tf-idf score
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Don Chen, University of North Carolina, Charlotte; Bruce Gehrig, University of North Carolina, Charlotte
Tagged Divisions
Computing & Information Technology
both Revit and Vico. Considering these factors, together with the ease ofavailability of the two software packages, it was decided to select Revit and Vico as the BIMsolutions under study.The Body of Knowledge (BOK) for ConE EducationLike any other pedagogical techniques, BIM technology should be integrated into ConEcurricula to accomplish their BOK requirements.Hildreth and Gehrig21 identified the following four principal knowledge areas and their subsetsof knowledge and skills to define the ConE BOK: I. The knowledge and skills associated with cost estimating include: a. understanding the requirements of the work based on the drawings and specifications; b. estimating work quantities; c. evaluating and selecting appropriate
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Francis Giraldeau, Polytechnique Montreal; Michel R. Dagenais, Ecole Polytechnique de Montreal; Hanifa Boucheneb, École Polytechnique de Montréal
Tagged Divisions
Computing & Information Technology
fairness, is given inFigure 6. We observe in a) that a mutex may be unfair if the lock is obtained just after beingreleased, while chained semaphores in b) produce a pattern that resembles a checkerboard.However, if the critical section is short and frequent, a simple mutex is much faster on av-erage than the perfect fairness achieved with chained semaphores, where a context switch isforced at each cycle. Understanding the fine differences between lock types, clearly exposedby looking at their detailed behavior, would be hard to achieve without tracing. (a) Blocking mutex (b) Spinlock running in userspace Figure 5: Difference between mutex and spinlockThe
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Abby M Kelly, University of Washington; Evan T. Curtis, Univeristy of Nebraska, Lincoln; Johnathan Ian Edward McCoy, University of Nebraska, Lincoln; Dennis D. Schulte P.E., University of Nebraska, Lincoln; David Jones, University of Nebraska, Lincoln
Tagged Divisions
Computing & Information Technology
consulted for assistance. After evaluation, evidence was uploaded into a Microsoft Access database and stored in asecure network folder. This folder was available only to those active in the ABET analysisprocess to ensure preservation of the document. Within the Access database, courses were organized based on course number and in order Page 25.192.4to view specific courses, a user could scroll using the arrows seen in Figure 3.A to cycle throughthe list of courses. The top matrix for each course, labeled “Target”, is a repetition of the SOM,showing the courses targeted Bloom’s levels for each of the ABET Student Outcomes (Figure3.B). The
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manghui Tu, Purdue University Calumet; Kimberly Lynn Spoa-Harty, Purdue University Calumet Graduate Student
Tagged Divisions
Computing & Information Technology
ate upd rds A hea ccess processing nd n g a reco lth ing Data s i e car & es car e B upd Acc ealth
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Ali Salehnia, South Dakota State University; Shieva Salehnia
Tagged Divisions
Computing & Information Technology
realizes that his/her friend has a copy of the final exam questions. a. Pat should report this to his/her instructor. b. Pat may obtain a copy of the questions from her/his friend by promising not to report the incident. c. Pat should keep quiet about the matter. It is not her/his business. d. They should sell the questions to other students in the class. (Baylor University: “Workplace Ethics Questionnaire,” 2015)ANALYSIS OF DATAThe survey was administrated at the start and at the end of term. The comparison between thesets of results are also shown in the graphs and data tables.The raw percentage data sets of the comparisons between computer science (CS) and non-computer science majors (others) are found below. The results
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Chafic Bousaba, Guilford College; Tiera Kazar, Guilford College; Will C. Pizio, Guilford College
Tagged Divisions
Computing & Information Technology
, and a quick start guide totaling approximately$80+tax. The model of Raspberry Pi used for this project is the Raspberry Pi 2 Model B, which“replaced the original Raspberry Pi 1 Model B+ in February 201516.” Shared features includefour USB ports, 40 general-purpose input/output (GPIO) pins, full High-Definition MultimediaInterface (HDMI) video output, Ethernet port, combined 3.5mm audio jack and composite video,a camera serial interface (CSI), display interface (DSI), Micro SD card slot, and VideoCore IV3D graphics core. Raspberry Pi 1 Model B+ has a Broadcom BCM2835 700 MHz ARM11processor, whereas the Raspberry Pi 2 Model B has an updated Broadcom BCM2836 900 MHzquad-core ARM7 processor, which boosts performance approximately six times its
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Reza Hashemian P.E., Northern Illinois University; Suresh Vakati
Tagged Divisions
Computing & Information Technology
GUI for user monitoring.Images of completed mobile platform are shown in Figure 4. (a) Overall system. (b) Close up view of electronics. Figure 4: Images of the mobile platform.ASEE Annual Conference 2016 New Orleans, USDesigning a GUI to provide users with excellent visual composition is a vital part of remotetestbed designs. The goal is to improvise and enhance the visual experience between the humaneye and computer. Considering the issues for an effective GUI, HTML was used as a softwaretool for testbed GUI development. Along with HTML, Cascaded Style Sheets (CSS) wereprovided to improve the overall visual experience. The
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Stephany Coffman-Wolph, West Virginia University Institute of Technology
Tagged Divisions
Computing & Information Technology
,instructions, and alternatives are provided in Appendix B. As mentioned earlier the first part ofthis activity was inspired by “The Orange Game” from CS Unplugged 2 and uses it as a warm upexercise. This is a great outreach activity to have students participate in after they have beensitting working on individual tasks and can be easily tailored to various time lengths.Linked List with Yarn and Paper BagsLearning Objectives: • Define, in their own words, a data structure • Define, in their own words, a linked list • Explain the steps to add a node to a linked list (front or back) • Explain the steps to delete a node from a linked list (front or back)In this activity, students learn about the basic data structure linked list. Many students
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Roxanne Moore, Georgia Institute of Technology; Douglas Edwards, Georgia Institute of Technology; Jason Freeman, Georgia Institute of Technology; Brian Magerko, Georgia Institute of Technology; Tom McKlin, SageFox Consulting Group; Anna Xambo, Georgia Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Science Foundation (CNS #1138469, DRL#1417835, and DUE #1504293), the Scott Hudgens Family Foundation, and the Arthur M. BlankFamily Foundation.References[1] J. M. Wing, “Computational thinking and thinking about computing,” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 366, no. 1881, pp. 3717–3725, 2008.[2] M. Guzdial and E. Soloway, “Teaching the Nintendo generation to program,” Commun. ACM, vol. 45, no. 4, pp. 17–21, Apr. 2002.[3] A. Bruckman, M. Biggers, B. Ericson, T. McKlin, J. Dimond, B. DiSalvo, M. Hewner, L. Ni, and S. Yardi, “‘Georgia computes!’: improving the computing education pipeline,” in Proceedings of the 40th ACM technical symposium on Computer
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Steven Walter Tuttle, University of Technology Sydney; Bruce Moulton, University of Technology Sydney; David Lowe, The University of Sydney
Tagged Divisions
Computing & Information Technology
comparative literature review.,” ACM Comput. Surv., vol. 38, no. 3 Article 7, 2006.      [2] E. Lindsay and M. C. Good, “Effects of laboratory access modes upon learning outcomes,” Educ. IEEE Trans., vol. 48, no. 4, pp. 619–631, 2005.[3] J. E. Corter, J. V Nickerson, S. K. Esche, C. Chassapis, S. Im, and J. Ma, “Constructing reality: A study of remote, hands-on, and simulated laboratories,” ACM Trans. Comput. Interact., vol. 14, no. 2, p. 7, 2007.[4] B. Aktan, C. A. Bohus, L. A. Crowl, and M. H. Shor, “Distance learning applied to control engineering laboratories,” Educ. IEEE Trans., vol. 39, no. 3, pp. 320–326, 1996.[5] Labshare, “The
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona; David Layton, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
Page 25.1009.2for them. Students can do all the homework from any location as long as they have access tocomputer.(b)-A student can learn at his or her own pace.(c)- Degrees can be completed in less time compared to traditional universities.(d)- Students have fewer distractions, and it can be less intimidating to participate in thediscussions.(e)-Students have the opportunity to connect with and work alongside students from otherlocations.Cons(a)-Students who have trouble managing their time may find it difficult.(b)-Lack of interaction personally with other students and the instructor.(c)-Technology and/or technology issues may be a barrier for some students2- Limitations of the onsite teaching of senior projectsSenior projects often consist
Conference Session
Emerging Computing and Information Technologies II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Javad Shakib, DeVry University, Pomona; James R. Lewis, DeVry University, Pomona
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Instrumentation SetupThe Bioinformatics offers a representation of medical data (e.g., nucleotide and amino acid sequences—DNA) in a quantitative and precise (almost exactly) using discrete representation. In this lab, we willexplore the sequence of the typical chain nucleic acid molecules containing adenine, guanine, cytosine,and thymine/uracil specific to DNA, RNA, and proteinThe BioMedical instrumentation setup depicted above is used in conjunction with The Silver(Ag)-Silver Chloride (AgCl) electrodes, a high-performance bio-potential amplifier with built-inhardware filter from iWorx, IV, National Instrument Elvis II+, and Laptop/PC runningBiomedical Workbench, LabVIEW, and MATLAB.The only new addition is Raspberry PI 3 Model B Python Module: it uses
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Bahareh Azarnoush, Arizona State University; Jennifer M Bekki, Arizona State University; Bianca L. Bernstein, Arizona State University; George C Runger, Arizona State University
Tagged Divisions
Computing & Information Technology
databases. In ACM SIGMOD Record, volume 22, pages 207-216. ACM, 1993. 8. O.R. Zaiane and J. Luo. Towards evaluating learners' behaviour in a web-based distance learning environment. In Advanced Learning Technologies, 2001. Proceedings. IEEE International Conference , pages 357-360. IEEE, 2001. 9. R. Cooley, B. Mobasher, J. Srivastava, Data preparation for mining world wide web browsing patterns. Knowledge and information systems, 1(1):5-32, 1999. 10. O.R. Zaiane. Building a recommender agent for e-learning systems. In Computers in Education, 2002. Proceedings. International Conference on, pages 55-59. IEEE, 2002. 11. F. Abel, I. Bittencourt, N. Henze, D. Krause, and J. Vassileva. A rule-based
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Araceli Martinez Ortiz, Texas State University - San Marcos; Mina Guirguis, Texas State University
Tagged Divisions
Computing & Information Technology
courses. The modules are designed to be stand-alone mini-lecturesthat describe how CS is relevant in other disciplines/fields such as cyber warfare, biology,electronic voting, epidemics, etc. These modules would be supported by class projects thatreinforce such paradigms. Teams of faculty in the STEM Faculty Learning Community willdevelop course modules in collaboration with CS faculty who coordinate entry- level classes.5. Study MethodologyThis study is composed of two efforts: (a) developing the intervention- the course modules thatwill be integrated into particular introductory computer science classes and (b) studying the impactof those modules upon students’ perceptions of computer science through surveys.In the first effort, it has been
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
James Lohse, Holladay Labs; Reza Sanati-Mehrizy, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing & Information Technology
Expert Systems With Applications (pp. 9939-9945) Vol 39(2012) Elsevier6. http://decoda.univ-avignon.fr/projet.php7. Bechet, F., Maza, B., Bigouroux, N., Bazillon, T., El-Bèze, M., De Mori, R., & Arbillot, E. DECODA: a call-center human-human spoken conversation corpus.8. http://www.wsj.com/articles/metadata-can-expose-persons-identity-even-when-name-isnt-1422558349 Page 26.439.119. http://bits.blogs.nytimes.com/2015/01/29/with-a-few-bits-of-data-researchers-identify-anonymous-people/?_r=010. http://www.sciencemag.org/content/347/6221/536.full?intcmp=collection-privacy11. Speaker Identification by Speech
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Thomas J. Hacker, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
fast and portable dynamic translator. 2005: USENIX.7. Victoria, B., Creating and Controlling KVM Guests using libvirt. 2009, University of Victoria.8. Yu, J. Performance Evaluation on Linux Bridge. 2004.9. SWSoft. OpenVZ User's Guide. 2005 July 1, 2009; Available from: http://download.openvz.org/doc/OpenVZ-Users-Guide.pdf.10. McLennan, M. and R. Kennell, HUBzero: A Platform for Dissemination and Collaboration in Computational Science and Engineering. Computing in Science & Engineering, 2010. 12(2): p. 48-53.11. Watson, J., Virtualbox: bits and bytes masquerading as machines. Linux Journal, 2008. 2008(166): p. 1.12. Corbato, F. and V. Vyssotsky. Introduction and overview of the Multics system. 1965: ACM.13
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Chris Foreman, Purdue University, West Lafayette; Matthew Turner, Purdue University (Statewide Technology); Karl Perusich, Purdue Statewide Technology DO NOT USE DUPE
Tagged Divisions
Computing & Information Technology
corporate CIS and engineering professionals will have a common vocabulary by which tomeet security challenges. Outlines of the modules with respect to student groups are as follows.A. Topics for CIS students: 1. ICS hardware a. Programmable Logic Controller (PLC) processor architecture b. PLC real-time operating systems c. Sensory input and actuator output buffers and interfaces 2. ICS software a. Human Machine Interfaces, GUI b. PLC programming languages, overview i. 981 ladder logic ii. IEC 61131-3 3. ICS networks a. Ethernet considerations in real-time networks b. Modbus/TCP and serial links i. RS-232 and RS-485 c. Proprietary
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tony Andrew Lowe, Purdue University, West Lafayette (College of Engineering); Sean P. Brophy, Purdue University, West Lafayette (College of Engineering)
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
studies are potentially limited because they primarily engage self-selectingstudents in extra-curricular study groups, and thus may include be selecting motivated studentswho rather than simply effects of PLTL. One of the additional hopes of this paper is to inspireempirical research, perhaps even retrospective views of courses such as this study, to further theunderstanding of peer learning in the classroom.References[1] L. Vygotsky, Thought and language. Cambridge, MA: MIT Press, 1962.[2] N. Salleh, E. Mendes, and J. Grundy, “Empirical Studies of Pair Programming for CS/SE Teaching in Higher Education: A Systematic Literature Review,” IEEE Trans. Softw. Eng., vol. 37, no. 4, pp. 509–525, 2011.[3] L. Porter, C. Bailey-Lee, and B
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Iem Heng, New York City College of Technology; Farrukh Zia, New York City College of Technology, CUNY; Andy Zhang, New York City College of Technology
Tagged Divisions
Computing & Information Technology
communicates with the Bluetooth USBmodule on Computer-A. The Bluetooth USB module driver software on Computer-A creates alocal virtual COM port. The TCP-COM software installed on Computer-A in the server modetakes the serial data from virtual COM port and retransmits it to Computer-B over the Ethernetnetwork by using the TCP/IP network protocol. Another instance of the TCP-COM softwareinstalled on Computer-B in the client mode, converts the data received using TCP/IP protocol toa local virtual COM port on Computer-B. The Hyperterminal communication program onComputer-B receives and transmits serial data through the local virtual COM port, therebyestablishing a two way communication channel with the PIC micro-controller as seen in thefollowing Figure 2
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Alka R Harriger, Purdue University, West Lafayette; Mayari I. Serrano, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
also include socialactivities to show that college can be fun, too.The Computer and Information Technology department actively participates in these outreachprograms. A variety of activities designed by faculty, undergraduate, and graduate students havebeen used in these sessions over the past ten years. Some example sessions included the use ofthe following tools: 1. Web page development (static HTML to dynamic ASP.NET) 2. Social media tools through a Twitter-enabled game 3. Programming languages a. Alice b. Scratch c. Scratch 4 Arduino d. C# 4. Physical computing a. Arduino board b. Phoenix Contact Nanoline microcontrollerThe remainder of this paper will present the