Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 187 in total
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Paper ID #15290Progress and Impact of LEAP: An NSF S-STEM Scholarship ProjectDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. She received her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science Department at Utah Valley
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Usman Ghani, DeVry University; Ahmed S. Khan, DeVry University, DuPage
Tagged Divisions
Computing & Information Technology
various professional IT consulting assign- ments. Dr. Ghani holds MSEE from Illinois Institute of Technology, MBA from Keller Graduate School of Management and Doctorate from Northern Illinois University.Dr. Ahmed S. Khan, DeVry University, DuPage Dr. Ahmed S. Khan is a Senior Professor in the College of Engineering and Information Sciences at DeVry University, Addison, Illinois. Dr. Khan has more than thirty years of experience in research, instruction, curricula design, development, evaluation, implementation and program accreditation, management and supervision. Dr. Khan received an MSEE from Michigan Technological University, an MBA from Keller Graduate School of Management., and his Ph.D. from Colorado
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Michael Tamir; Ronald S Harichandran P.E., University of New Haven; Lueny Morell, InnovaHiEd
Tagged Divisions
Computing & Information Technology
Paper ID #11314San Francisco’s New Start-Up is Reengineering Engineering EducationDr. Michael TamirDr. Ronald S Harichandran P.E., University of New Haven Ron Harichandran is Dean of the Tagliatela College of Engineering and is part of the leadership team for the launch of the Master of Science in Data Science in San Francisco in partnership with GalvanizeU.Mrs. Lueny Morell, InnovaHiEd Lueny Morell, MS, PE, is President of Lueny Morell & Associates and Director of InnovaHiEd, a world- class team of experts with extensive academic and industry experience offering services to help higher education leaders in
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Krystal S Corbett, Cyber Innovation Center; Chuck Gardner, New Orleans Military and Maritime Academy; Anthony Joseph Taffaro Jr., New Orleans Military and Maritime Academy; Marvin Nelson, Benton High School
Tagged Divisions
Computing & Information Technology
Paper ID #7468Piloting a New Curriculum: A View from the TrenchesDr. Krystal S Corbett, Cyber Innovation CenterDr. Chuck Gardner, New Orleans Military and Maritime AcademyMr. Anthony Joseph Taffaro Jr., New Orleans Military and Maritime Academy Mr. Anthony Joseph Taffaro, Jr. is a native of New Orleans, Louisiana, and has resided in the New Orleans area his entire life. Mr. Taffaro is a graduate of Jesuit High School New Orleans and Tulane University. At Tulane, Mr. Taffaro received Bachelor of Arts in Social Sciences and a minor in Business Studies. Mr. Taffaro spent much of his career in the banking industry and entered
Conference Session
Emerging Computing and Information Technologies II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Joseph William Beckman, Purdue University; Melissa Jane Dark, Purdue University; Pratik Kashyap, Purdue University; Sumra Bari, Purdue University, School of Electrical and Computer Engineering; Samuel S. Wagstaff Jr, Purdue University; Yingjie Chen, Purdue Polytechnic Institute; Baijian Yang, Purdue Polytechnic Institute
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
is in biomedical signal and image processing.Ms. Sumra Bari, Purdue University, School of Electrical and Computer Engineering Sumra Bari received the Bachelor’s degree in Electrical Engineering in 2011 from the University of Engi- neering and Technology, Lahore, Pakistan and the Master’s degree in 2015 from Purdue University, West Lafayette, IN where she is currently working towards the Ph.D. degree in School of Electrical and Com- puter Engineering. Her research interests include functional neuroimaging, statistical biomedical imaging and signal processing and model based image processing.Prof. Samuel S. Wagstaff Jr, Purdue University Sam Wagstaff is a computer science professor at Purdue University. He works in
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Jinyi Zhang, Purdue University; Pan Fengjian, Purdue University, West Lafayette; Mrigank S. Jha, Purdue University, West Lafayette; Pranav Marla, Purdue University; Kee Wook Lee, Purdue University; David B Nelson, Purdue University, West Lafayette; Yung-Hsiang Lu, Purdue University
Tagged Divisions
Computing & Information Technology
, West Lafayette, IN. He is the current leader of A.C.C.E.S.S. team.Mr. Mrigank S. Jha, Purdue University, West Lafayette Mr. Jha works as a Web Developer for World Wide Technology in St Louis, Missouri. He graduated from Purdue University in December 2015, with a Bachelor’s Degree in Electrical Engineering. He worked as a front-end developer for A.C.C.E.S.S - Analysis of Code on Cloud as an Educational Service to Students.Mr. Pranav Marla, Purdue University Pranav Marla is an undergraduate student at the College of Science in Purdue University. He is pursuing a major in Computer Science, with a specialization in Machine Intelligence. He designed the entire backend of A.C.C.E.S.S.Mr. Kee Wook Lee, Purdue University
Conference Session
Curricular Issues in Computer-oriented Programs
Collection
2012 ASEE Annual Conference & Exposition
Authors
Ibraheem A. Kateeb, North Carolina A&T State University; Larry Burton, North Carolina A&T State University; Naser El-Bathy P.E., North Carolina A&T State University; Michael S. Peluso, North Carolina A&T State Univerisity
Tagged Divisions
Computing & Information Technology
technology at North Carolina A&T State University. He earned his B.S. degree from Wayne State University, Mich., M.S, (computer science, 2006) from Wayne State University, and Ph.D. (information technology, 2010) from Lawrence Technological University. El-Bathy is currently teaching at the North Carolina A&T State University. His interests are in health informatics, bioinformatics, artificial intelligence, intelligent infor- mation retrieval, and intelligent web development. El-Bathy may be reached at nielbath@ncat.edu.Mr. Michael S. Peluso, North Carolina A&T State Univerisity Mike Peluso has been involved in high technology management and support for the better part of two decades. Peluso started his career
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Abby M Kelly, University of Washington; Evan T. Curtis, Univeristy of Nebraska, Lincoln; Johnathan Ian Edward McCoy, University of Nebraska, Lincoln; Dennis D. Schulte P.E., University of Nebraska, Lincoln; David Jones, University of Nebraska, Lincoln
Tagged Divisions
Computing & Information Technology
table showed the correlation of the desired 3-5 year post graduationcompetencies of the PEOs to their foundation in student outcomes A.1-K. Table 1 AGEN Mapping of Student Outcomes to PEOs Student Outcomes PEOs A.1 A.2 B C D E F G H I J K 1 S S S S M S M S M M S S 2 M M M S L S M L M S S S 3 S M S S L S L S M S S S 4 M M L L S
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona; Sogand Kavianpour; Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
Theory and Mechatronics.3.1 PID Control in a Robot Arm Figure 2: Robotic ArmConsider a robotic arm (Figure 2) with four joints:1: Turntable, 2: Bicep, 3: Forearm, 4: WristJoints are moved by a DC/Servo motor. The Robotic Arm controller consists offour PIDs (one per joint). 𝐾𝑝, 𝐾𝑖, 𝐾𝑑 for each PID loop is calculated separately.This process can be time-consuming. Alternatively, you can tune all four PID loopssubject to system-level requirements. MATLAB has the tools to calculate PIDvalues. The transfer function of a PID controller is found by taking the Laplacetransform.We can also define a PID controller in MATLAB directly using the transferfunction, for example: Kp = 1; Ki = 1; Kd = 1; C = Kp + Ki/s + Kd*s C
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Chengying Xu, Florida State University; Seyed Mousavinezhad, Idaho State University
Tagged Divisions
Computing & Information Technology
Manufacturing since 2010 and International Journal of Computational Materials Science and Surface Engineering since 2007.Dr. S. Hossein Mousavinezhad, Idaho State University Dr. Hossein Mousavinezhad is an active member of ASEE, IEEE and is a program evaluator for engi- neering programs (ABET). Hossein is a Professor of Electrical Engineering at Idaho State University and serves as IEEE Education Society VP, is the Founding General Chair of IEEE International Conferences on Electro Information Technology. Page 26.385.1 c American Society for Engineering Education, 2015 Computer-Aided
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
David M. Whittinghill, Purdue University, West Lafayette; Jacob Samuel Brown, Purdue University
Tagged Divisions
Computing & Information Technology
Paper ID #10954Gamification of Physical Therapy for the Treatment of Pediatric CerebralPalsy: A Pilot Study Examining Player PreferencesDr. David M Whittinghill, Purdue University, West Lafayette Dr. David Whittinghill is an Assistant Professor of Computer Graphics Technology and Computer and Information Technology. Dr. Whittinghill’ s research focuses on simulation, gaming and computer pro- gramming and how these technologies can more effectively address outstanding issues in health, educa- tion, and society in general. Dr. Whittinghill leads projects in pediatric physical therapy, sustainable energy simulation, phobia
Conference Session
Computing & Information Technology Division Poster Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
John Martin, Youngstown State University; Anna M. Martin, Kent State University
Tagged Divisions
Computing & Information Technology
and concurrentinstructional groups will serve as the independent variables; while the dependent variables areengineering concept knowledge, FEA skills scores, and subjective cognitive load scores.Pre-Test: FEA Software Skill and Engineering Concepts Students will first complete a pre-test to identify their baseline FEA software skills andknowledge of FEM. Figure 1 shows an example of a sample pre-test question where thedeflection values need to be determined for an axially loaded steel plate, by means of FEM andFEA software utilizing beam elements.6 Figure 1. Pre-test sample question.6 Reprinted from Finite element analysis: theory and application with ANSYS, (p. 33), S., Moaveni, 2015, Pearson.Group 1: Simultaneous
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Jimmy Faraon, National University
Tagged Divisions
Computing & Information Technology
) to store large amounts of data. Itis designed to make web scale computing easier for developers. The AS3 provides asimple web services interface that can be used to store and retrieve any amount of data, atany time, from anywhere on the web5. It gives any developers access to the same highlyscalable, reliable, secure, fast, inexpensive infrastructure that Amazon uses to run its ownglobal network of web sites. The service aims to maximize benefits of scale and to passthose benefits on to developers. Data stored in AS3 is secured by default. AS3 supportsmultiple access control mechanisms, as well as encryption for both secure transit andsecure storage on disk. With AS3’s data protection features, the user can protect data
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Regina Melo Silveira P.E., Universidade de São Paulo; Itana Stiubiener Mrs, Universidade Federal do ABC - UFABC; Wilson V Ruggiero, LARC-EPUSP
Tagged Divisions
Computing & Information Technology
Paper ID #11364Is a video used as a didactic content effective in the learning process?Dr. Regina Melo Silveira P.E., Universidade de S˜ao Paulo Regina Melo Silveira is Assistant Professor and researcher at the Department of Computer and Digital Systems Engineering (PCS) at Escola Polit´ecnica - Universidade de S˜ao Paulo (EPUSP), since February 2002. Associated to LARC (Laboratory of Computer Architecture and Networks) she works in the Net- working area since 1995. She participated in relevants Projects like Poli-Virtual, Multimedia on Demand System, RMAV-SP (S˜ao Paulo Internet 2), Tidia-Ae, KyaTera, and Interactive TV
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
’, ‘behavior’ and ‘function’ as wellas similarly named and closely related concepts (such as “form and function”) for describingaspects of design. I have chosen to use the terms Structure (S), Function (F) and Activity (A) anddefine them as follows.Designers apply functional intentions (F) to abstract structures of instruction architecture (S) byexecuting a variety of instructional design activities (A). These structures, functions andactivities are different abstract domains or layers of the design process; each domain capturessome aspect of design decisions. The usage of these terms will be illustrated by an example.Technical content changes rapidly and constantly but the professor has no control of that changeprocess and cannot make design
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Tokunbo Ogunfunmi, Santa Clara University
Tagged Divisions
Computing & Information Technology
course also involves completion of a simple projectwhich involves real-time simulation of a MATLAB/Simulink-based speech codingalgorithm for coding speech [9]. Page 25.960.4Analog telephone systems have mostly been replaced by digital telephone systems. Butwith the advent of digital systems, the speech can be coded and has more flexibility, easeof regeneration and security than analog systems. But the disadvantage of digital systemsis it requires larger bandwidth. The speech coding technology has gone through a numberof phases starting with the development and deployment of PCM and ADPCM systems.The 64 kb/s Log-PCM and 32 kb/s ADPCM systems which have
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Gretchen G. Achenbach, National Center for Women & IT; Leslie G. Cintron PhD, University of Virginia; J McGrath Cohoon, University of Virginia; Philip Michael Sadler, Harvard Smithsonian Center for Astrophysics; Gerhard Sonnert, Harvard University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
, Page 26.328.4Helping other people, Having others working under my supervision, Having job security,Working with people rather than objects, Inventing new things, Developing new knowledge andskills, Having lots of family time, Having lots of time for myself/friends, Making my owndecisions, Having an easy job, Having an exciting job, Making use of my talents/abilities,Working in an area with lots of job opportunities. Characteristics were rated on a scale of 1 to 6,where 1 = Not at all important and 6 = Very important. (For more information on the PRiSEproject and survey methodology, see 26, 27)Occupational DataThe most recent available occupational statistics were obtained from the U. S. Bureau of LaborStatistics (BLS). These include 2013
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alexander A. Kist, University of Southern Queensland
Tagged Divisions
Computing & Information Technology
as it provides high bandwidth access at avery low latency.Fixed Wireless BroadbandFWB access is suitable for fringe areas, metro black spots and sparsely populated areas withsuitable propagation characteristics, i.e. not mountainous. It will rely on 4G mobile technology(IMT advanced) with peek data rates of 1Gbit/s. Latency of the access component of the networkis low by design, i.e. 10ms under ideal conditions. This has been demonstrated in a field trail 20.A factor that could introduce additional, unacceptable latencies is extensive wireless backhaul.For most areas this is not an issues as the proposed network topology largely relies on opticalfibre backhaul.SatelliteAreas that are not covered by FTTH or FWB have to rely on satellite
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Barbara E. Brazon, Penn State University; Mary Lynn Brannon, Pennsylvania State University, University Park
Tagged Divisions
Computing & Information Technology
abilities.”6 These objectives were achieved utilizing a variety of Page 22.1605.3active learning methods, including lecture, demonstration, problem solving, collaborative work,formal team work, and peer learning. The assessment was done as formative assessment via oraland written reports and tests; and summative assessment with the completion of theimplementation of the website for the final grade. Interviews were conducted to acquire feedbackfrom the students on their perception of the learning experience using the Lesson‟s Learnedapproach.Course DescriptionIT Project Management was designed with two pedagogical approaches to learning
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Seyed Mousavinezhad, Idaho State University; R. Eugene Stuffle, Idaho State University; Wei Pan, Idaho State University; Steven Grant Maclure, Idaho State University
Tagged Divisions
Computing & Information Technology
Paper ID #8728Computing Tools in an Advanced Filter Theory CourseDr. S. Hossein Mousavinezhad, Idaho State University Dr. Mousavinezhad is an active member of IEEE and ASEE having chaired sessions in national and re- gional conferences. He is an ABET Program Evaluator (PEV.) He is the Founding General Chair of the IEEE International Electro Information Technology Conferences, www.eit-conference.org and served as 2002/2003 ASEE ECE Division Chair. He is a panelist for the National Science Foundation, has published a book in hand-held computing in 2013 and received an NSF grant (Enhancing Access to Radio Spec- trum
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Maurice F. Aburdene, Bucknell University; Kundan Nepal, Bucknell University
Tagged Divisions
Computing & Information Technology
: Data Rate = Bandwidth*log2(1+ S/N) where S/N is the ratio of the signal power to the noise power in decibels(dB).Now, students were asked to find the ASCII code for the initials of their names and showtheir understanding of the bit rate and bandwidth of the communication channel by repeatingthe Fourier analysis on those letters. To generate the ASCII waveform, students programmedthe Agilent 33120A Function Generator. Next, they designed a first-order RC low-pass filterwith a 3 kHz bandwidth and observed and captured the output response of the filter to theASCII waveform. 1. Obtain the binary 7-bit ASCII code for the first letter of your first name and last name. a. What is the 8-bit code using odd parity? Where did you put
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Briana Lowe Wellman, University of the District of Columbia; Tommy Suriel, University of The District of Columbia; Evanna Maria Reynoso
Tagged Divisions
Computing & Information Technology
demonstrate differences in team performance for simulations and real robotexperiments. While simulations are good for quicker testing and a cheaper solution thanpurchasing equipment, conducting experiments with real robots allows for more accurate results.In physical experiments, there are many factors, such as robot interference, an unknownenvironment, and delayed communications, which can influence results. However, running realexperiments are required to accurately test the efficiency of an approach. Future work includesexamining these factors further.Bibliography[1] S. Dawson, B. L. Wellman, and M. Anderson, “Using simulation to predict multi-robot performance on coveragetasks,” in Intelligent Robots and Systems (IROS), 2010 IEEE/RSJ
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Yosi Shibberu, Rose-Hulman Institute of Technology
Tagged Divisions
Computing & Information Technology
. Consumerproducts that depend on deep learning, products like Amazon’s Alexa and Google Home, are thetip of a new wave of innovation that will change the way consumers interact with products.Scientists and engineers with expertise in deep learning are already in short supply.Deep learning is based on an old technology — neural networks. In fact, some argue that deeplearning is simply a re-branding of neural networks, a technology that has been through several“hype-cycles 3 .” Neural networks date to as far back as the 1940’s and 1950’s. In 1957, FrankRosenblatt introduced the Perceptron, the forerunner of today’s modern neural networks. What isnew today is the availability of big data sets to train large and deep neural networks and theavailability of the
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Roxanne Moore, Georgia Institute of Technology; Douglas Edwards, Georgia Institute of Technology; Jason Freeman, Georgia Institute of Technology; Brian Magerko, Georgia Institute of Technology; Tom McKlin, SageFox Consulting Group; Anna Xambo, Georgia Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Science Foundation (CNS #1138469, DRL#1417835, and DUE #1504293), the Scott Hudgens Family Foundation, and the Arthur M. BlankFamily Foundation.References[1] J. M. Wing, “Computational thinking and thinking about computing,” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 366, no. 1881, pp. 3717–3725, 2008.[2] M. Guzdial and E. Soloway, “Teaching the Nintendo generation to program,” Commun. ACM, vol. 45, no. 4, pp. 17–21, Apr. 2002.[3] A. Bruckman, M. Biggers, B. Ericson, T. McKlin, J. Dimond, B. DiSalvo, M. Hewner, L. Ni, and S. Yardi, “‘Georgia computes!’: improving the computing education pipeline,” in Proceedings of the 40th ACM technical symposium on Computer
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manghui Tu, Purdue University Calumet; Kimberly Lynn Spoa-Harty, Purdue University Calumet Graduate Student
Tagged Divisions
Computing & Information Technology
ate upd rds A hea ccess processing nd n g a reco lth ing Data s i e car & es car e B upd Acc ealth
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Ching-Kuang Shene, Michigan Technological University; Chaoli Wang, University of Notre Dame; Jun Tao, Michigan Technological University; Melissa Sue Keranen, Michigan Technological University; Jun Ma, Michigan Technological University; Jean Mayo, Michigan Technological University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
effective way for educators to battle this challenge. This paper describes a tool,SHAvisual, which addresses this issue for the secure hash algorithm (SHA). SHA is a family ofcryptographic hash functions that the National Institute of Standards and Technology beganpublishing in the early 1960’s. SHAvisual is designed to help students learn and instructorsteach the SHA-512 algorithm. It consists of three major components: Demo Mode, PracticeMode and Full Mode. A separate global view window helps highlight the current procedure inthe algorithm pipeline. The Demo Mode provides a simplified SHA-512 visualization and isuseful for the instructor to demonstrate important operations in the classroom. The PracticeMode is designed for students to learn the
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Edward F. Gehringer, North Carolina State University
Tagged Divisions
Computing & Information Technology
two have known defects. How close the student reviewer comes tothe instructor’s rating of these three artifacts determines the reviewer’s reviewercompetency index, and the RCI is used to weight the reviewer’s scores in a calculation ofthe author’s grade. The Coursera MOOC platform employs a takeoff on this strategy: astudent is asked to rate one actual student submission, which has also been rated by aninstructor. If the student’s rating is “close enough,” the student is allowed to assesspeers’ work. Otherwise, the student is given another pre-rated artifact to assess. If thestudent’s score is “close enough,” (s)he is allowed to go on to assess peers; otherwise, theprocess is repeated up until the fifth attempt, after which the student
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Namratha Siripragada, Northern Illinois University
Tagged Divisions
Computing & Information Technology
, and Mathematics) project, award number DUE-1140502. Any opinions, findings, and conclusions or recommendations expressed in this materialare those of the authors and do not necessarily reflect the views of the National Science Foundation.References[1] Elliott, S. and Kukula, E. (2007), The Challenges Associated with Laboratory-Based Distance Education, EDUCASE Quarterly, pp. 37-42.[2] Saleem, A. I. and Al-Aubidy, K. M. (2008), Mixed Reality Environment for Web-Based Laboratory Interactive Learning, International Journal of Online Engineering, 4(1), pp. 40-45[3] Gomes, L. and Bogosyan, S. (2009). Current Trends in Remote Laboratories, IEEE Transactions on Industrial Electronics, 56(12), pp. 4744-4756.[4] García
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Steven Walter Tuttle, University of Technology Sydney; Bruce Moulton, University of Technology Sydney; David Lowe, The University of Sydney
Tagged Divisions
Computing & Information Technology
comparative literature review.,” ACM Comput. Surv., vol. 38, no. 3 Article 7, 2006.      [2] E. Lindsay and M. C. Good, “Effects of laboratory access modes upon learning outcomes,” Educ. IEEE Trans., vol. 48, no. 4, pp. 619–631, 2005.[3] J. E. Corter, J. V Nickerson, S. K. Esche, C. Chassapis, S. Im, and J. Ma, “Constructing reality: A study of remote, hands-on, and simulated laboratories,” ACM Trans. Comput. Interact., vol. 14, no. 2, p. 7, 2007.[4] B. Aktan, C. A. Bohus, L. A. Crowl, and M. H. Shor, “Distance learning applied to control engineering laboratories,” Educ. IEEE Trans., vol. 39, no. 3, pp. 320–326, 1996.[5] Labshare, “The
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; John B. Southworth, East Carolina University
Tagged Divisions
Computing & Information Technology
dual-stack hostname, in random order. Figure 8 shows that over the two year period fromJanuary 2014 to December 2015 the number of users accessing Google.com over IPv6 increasedfrom around 2.5% to just over 9%.Figure 8. Percent of users accessing Google.com over IPv6IPv6 traffic volume (U1)The traffic volume metric (U1) is a measure of how much Internet traffic is over IPv6. To get asnapshot of Internet IPv6 traffic volume we used publicly available statistics from theAmsterdam Internet Exchange (AMS-IX) 20. The AMS-IX is one of the largest Internet exchangepoints (IXP) in the world and connects more than 776 autonomous systems worldwide. AMS-IXtracks the percentage of native IPv6 traffic using s-flow statistics.The average aggregated Internet