Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 26 results
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Krystal S Corbett, Cyber Innovation Center; Chuck Gardner, New Orleans Military and Maritime Academy; Anthony Joseph Taffaro Jr., New Orleans Military and Maritime Academy; Marvin Nelson, Benton High School
Tagged Divisions
Computing & Information Technology
physics as less appealing, preferring to stay in the lab, and may not apply themselves in working complex, multistep problems. (B) Some are interested in pure science and/or are planning to pursue other scientific fields (e.g., medicine). These students sometimes have little interest in the bots and programming but may do well in learning theory and taking tests.Unfortunately, most students have never done any programming or worked with spreadsheets.Some students struggle with programming beyond simple commands. Programs of any length,which required use of several subroutines and “IF…THEN” logic, were a struggle for many ofthe students. We have not emphasized programming in the course; we see it as an enablingtechnology
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Jeffrey H Wright; Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai
Tagged Divisions
Computing & Information Technology
Influencing the Choice of Hearing Aid Type. CIKM '11 International Conference on Information and Knowledge Management, pp. 11-17, Association for Computing Machinery, New York, 2011. 2. Koh, H. C., & Tan, G., Data Mining Applications in Healthcare. Journal of Healthcare Information Management, pp. 64-72, http://www.himss.org, 2005. 3. Park, I., Lee, K. H., & Lee, D. Mining Cancer Genes with Running Sum Statistics. CIKM '09 Conference on Information and Knowledge Management , pp. 35-42, Association for Computing Machinery, New York, 2009. 4. Srinivas, K., Kavihta Rani, B., & Govrdhan, A., Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks. International
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Lifang Shih, Excelsior College; Jane A LeClair, Excelsior College
Tagged Divisions
Computing & Information Technology
are analyzed. Listed in thefollowing are the articulated benchmarks set to evaluate the attainment of each programoutcome:Metric 1: The percentage of the IT 495 students who receives a grade of 2 or higher (out of 3point) on the learning statements and supporting evidence for the designate program outcome.Metric 2: The percentage of the students who receive a grade of B or higher on two selectedcourse embedded assessments that measure the related program outcome. Page 23.1299.6Metric 3: The mean of the graduates’ perceptions of their achievement of the related programoutcomes (data collected from the exit survey).Metric 4 (Reference): The mean of
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Duke Mejia Bulanon, Northwest Nazarene University; Stephen A. Parke P.E., Northwest Nazarene University
Tagged Divisions
Computing & Information Technology
into a digital image. An RGB digital camera is commonly used for image acquisition especially if the desired object has a color contrast with respect to the background. Some applications require a special image acquisition system like a thermal camera or an infrared camera8. 3. Image processing acts as the brain of the machine vision and is typically composed of pre-processing, segmentation, and feature extraction. a. Pre-processing – modify and prepare the raw image to produce an image data that is suitable for subsequent operation. An example is increasing the intensity of the image pixels. b. Segmentation - the desired object is differentiated from the background. The
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University; Scott Pack
Tagged Divisions
Computing & Information Technology
. Page 23.818.95. Davies, N. and Gellersen, H.-W. Beyond Prototypes: Challenges in Deploying Ubiquitous Systems. IEEEPervasive Computing(January-March 2002 2002).6. Edwards, S., Lavagno, L., Lee, E. A. and Sangiovanni-Vincentelli, A. Design of embedded systems: formalmodels, validation, and synthesis. Proceedings of the IEEE, 85, 3 1997), 366-390.7. Lunt , B. M., Ekstrom, J. J., Gorka, S., Hislop, G., Kamali, R., Lawson, E. A., LeBlanc, R., Miller, J. andReichgelt, H. Information Technology 2008: Curriculum Guidelines for Undergraduate Degree Programs inInformation Technology. ACM, IEEE-CS, 2008.8. Times, E. Embedded Market Study 2011. City, 2011.9. Anderson, L. W., Krathwohl, D. R. and Bloom, B. S. A taxonomy for learning, teaching, and
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Francis N Mensah, College of Engineering and Technology, Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
informative thus leading to reliable, safeand secure design of CPS in the near future.REFERENCES1. B. M. Mckay and P. A. Engineer, “Best practices in automation security.” Cement Industry Technical Conference, 2012 IEEE-IAS/PCA 53rd, pp. 1 - 15, 2012.2. N. Adam, "Workshop on Future Directions in Cyber-Physical Systems Security ", in Report on Workshop on Future Directions in Cyber-Physical Systems Security, January, 2010.3. B. Miller and D. Rowe, “A survey SCADA of and critical infrastructure incidents,” in Proceedings of the 1st Annual conference on Research in information technology - RIIT ’12, p. 51, 2012.4. ENISA, “Protecting Industrial Control Systems,” 2011.5. B. Schneier, “All Security Involves Trade-offs
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Simin Hall, Virginia Tech; Clifford A. Shaffer, Virginia Tech; Eric Fouh, Virginia Tech; Mai Hassan ElShehaly, Virginia Tech; Daniel Breakiron, Virginia Tech
Tagged Divisions
Computing & Information Technology
(the post-test surveys were different for the two groups).Both sections received three weeks worth of instruction on sorting and hashing, and then bothsections took the identical test.The pre-survey from both groups measured a) students’ experience with online tools, content,and assessment, b) students’ perceptions of their learning in a face-to-face course compared withonline/Web-based instruction, c) students’ experience with using technology or e-textbook as itrelates to accomplishing course work, and d) students’ preference for lecture courses versuscourses given in a lab setting.The post survey from the treatment group measured students’ perception, enjoyment, and satis-faction with the OpenDSA modules, as well as their preference for
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Carlos R Morales, Purdue University, West Lafayette; Perry Lucas Cox; Matthew John Farrenkopf; Robert Eric Knorr, Purdue University; Erick Morales; Christopher Gaeta; Martin Jerome Durchholz
Tagged Divisions
Computing & Information Technology
Paper ID #6792Development of a Multi-Platform High Performance Computing StreamingVideo Distribution ClusterProf. Carlos R Morales, Purdue University, West LafayetteMr. Perry Lucas CoxMr. Matthew John FarrenkopfMr. Robert Eric Knorr, Purdue University I studied at Purdue University to receive a Bachelor’s of Science in Computer Graphic Technology. I specialized in production and practiced in production management.Erick MoralesMr. Christopher GaetaMr. Martin Jerome Durchholz Page 23.420.1 c American
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Dhana Rao, Marshall University; Rajeev K Agrawal, North Carolina A&T University (Tech); Venkat N Gudivada, Marshall University
Tagged Divisions
Computing & Information Technology
Paper ID #7151Scaffolding Beginning Research Students Using Open Source ToolsDr. Dhana Rao, Marshall University Dhana Rao is an Assistant Professor in Microbiology at Marshall University, West Virginia. She ob- tained her PhD in 2006 from the University of New South Wales, Australia. Her research interest are in metagenomics and bioinformatics.Dr. Rajeev K Agrawal, North Carolina A&T University (Tech) Dr. Rajeev Agrawal is an assistant professor in the department of computer systems technology at North Carolina A&T State University. He has published 30 referred journal and conference papers and 4 book chapters
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
James P Cohoon, University of Virginia; J. McGrath Cohoon, University of Virginia; Luther A Tychonievich, University of Virginia; Catherine E. Brawner, Research Triangle Educational Consultants
Tagged Divisions
Computing & Information Technology
Paper ID #6065Tapestry Workshops: Helping High School Teachers Grow and DiversifyComputingProf. James P Cohoon, University of Virginia James P. Cohoon is an Associate Professor in the Department of Computer Science at the University of Virginia. Cohoon has a PhD in Computer Science from the University of Minnesota, an M.S. in Computer Science from Pennsylvania State University, and a BS in Mathematics from Ramapo College of NJ. His research interests include algorithms, Computer Science Education, Diversity and Education, swarms, and VLSI physical design. His awards include the IEEE Computer Society Taylor Booth
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jason St. John, Purdue University, West Lafayette; Thomas J. Hacker, Purdue University, West Lafayette; Raymond A Hansen, Purdue University; Natasha N. Nikolaidis, Purdue University; Robert M Trinkle, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
Paper ID #7883Experiences Developing International Partnerships for Education and Re-search in ComputingMr. Jason St. John, Purdue University, West Lafayette Jason St. John earned a Bachelor of Science degree in Computer & Information Technology (Network Engineering Technology concentration) from Purdue University, West Lafayette in December 2010. In January 2011, he accepted a position as a Graduate Research Assistant in the Department of Computer & Information Technology at Purdue University working under Dr. Thomas Hacker. He is currently pursuing a master’s degree in high performance computing systems.Prof
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Munish Sharma, Northern Illinois University
Tagged Divisions
Computing & Information Technology
. Remote ExperimentationThe lead author has been working on remote laboratory development and implementation for Page 23.807.3more than ten years. During this period, he has attracted research and development grants fromthe National Science Foundation and industries. Some of these developments are used to deliverlaboratory courses within an electrical engineering technology program. This section willprovide an outline of those developments.To maximize the benefit of remote laboratories, the facility design philosophy includes a numberof features: a) use of emerging technologies; b) individualized learning; c) knowledge-centeredlearning; d
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona; Behdad Kavianpour, University of California, Irvine
Tagged Divisions
Computing & Information Technology
and(ρ,θ) is illustrated in Figure 1. A straight line in the plane is uniquely specified by two parameterssuch as (a, b) in the Cartesian space (a and b represent slope and intercept respectively), or (ρ, θ). Inthe polar (parameter) space where ρ is the length of the line segment from the origin perpendicularto the line, and θ is the angle that the line makes with the positive x axis, measured clockwise. Themost commonly used coordinate system in the Hough Transform implementation is (ρ, θ). With nimage points, the ranges of (ρ,θ) can be taken to be ρ: [−M, M ] and θ: [−π, π] where M depends onthe image size. If we restrict θ to be in [0, π] range, then normal parameters for the line will beunique. With this restriction, every line in the x
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Camilo Vieira, Eafit; Alejandra J. Magana, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
cyberinfrastructure, computation, and computational tools and methods to: (a) leverage the understanding of complex phe- nomena in science and engineering and (b) support scientific inquiry learning and innovation. Specific efforts focus on studying cyberinfrastructure affordances and identifying how to incorporate advances from the learning sciences into authoring curriculum, assessment, and learning materials to appropriately support learning processes. Page 23.301.1 c American Society for Engineering Education, 2013 Colombian Elementary Students’ Performance and Perceptions of
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Bahareh Azarnoush, Arizona State University; Jennifer M Bekki, Arizona State University; Bianca L. Bernstein, Arizona State University; George C Runger, Arizona State University
Tagged Divisions
Computing & Information Technology
databases. In ACM SIGMOD Record, volume 22, pages 207-216. ACM, 1993. 8. O.R. Zaiane and J. Luo. Towards evaluating learners' behaviour in a web-based distance learning environment. In Advanced Learning Technologies, 2001. Proceedings. IEEE International Conference , pages 357-360. IEEE, 2001. 9. R. Cooley, B. Mobasher, J. Srivastava, Data preparation for mining world wide web browsing patterns. Knowledge and information systems, 1(1):5-32, 1999. 10. O.R. Zaiane. Building a recommender agent for e-learning systems. In Computers in Education, 2002. Proceedings. International Conference on, pages 55-59. IEEE, 2002. 11. F. Abel, I. Bittencourt, N. Henze, D. Krause, and J. Vassileva. A rule-based
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
: ACollaborative Virtual Environment for Molecular Modeling," Proc. of ACM Symposium on Virtual Reality Softwareand Technology (VRST), Monterey, CA, 2005.[7] Billinghurst, M., Duenser, A., Augmented Reality in the Classroom. IEEE Computer, Volume 45, Issue 7, pp56-63, July 2012. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6171143[8] B. Shelton, N Hedley. Using Augmented Reality for Teaching Earth-Sun Relationships to UndergraduateGeography Students. The First IEEE International Augmented Reality Toolkit Workshop. Darmstadt, Germany.September, 2002.[9] Reitmayr, G., Schmalstieg, D., "Collaborative Augmented Reality for Outdoor Navigation and InformationBrowsing," Proc. of Symposium Location Based Services and TeleCartography, 2004.[10] Pair
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Shaundra Bryant Daily, Clemson University; Juan E Gilbert, Clemson University; Wanda Eugene, University of North Carolina Charlotte; Christina Gardner-McCune, Clemson University; Kyla Alanna McMullen, Clemson University; Phillip Wendell Hall Jr, Clemson University ; Sekou L Remy, Division of Human Centered Computing - School of Computing, Clemson University; Damon Lamar Woodard, Clemson University; Tania Roy, Clemson University
Tagged Divisions
Computing & Information Technology
and high school social studies classes. Page 23.144.1 Dr. Gardner-McCune recently completed a year and a half long Post-Doctoral Research position in com- puter science education at Georgia Institute of Technology’s College of Computing where she led the design of the I-3 Experience programs. She holds a B. S. degree in Computer Engineering from Syra- cuse University, and earned both her masters and doctorate in Computer Science from Georgia Institute c American Society for Engineering Education, 2013
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Briana Lowe Wellman, University of the District of Columbia; Tommy Suriel, University of The District of Columbia; Evanna Maria Reynoso
Tagged Divisions
Computing & Information Technology
demonstrate differences in team performance for simulations and real robotexperiments. While simulations are good for quicker testing and a cheaper solution thanpurchasing equipment, conducting experiments with real robots allows for more accurate results.In physical experiments, there are many factors, such as robot interference, an unknownenvironment, and delayed communications, which can influence results. However, running realexperiments are required to accurately test the efficiency of an approach. Future work includesexamining these factors further.Bibliography[1] S. Dawson, B. L. Wellman, and M. Anderson, “Using simulation to predict multi-robot performance on coveragetasks,” in Intelligent Robots and Systems (IROS), 2010 IEEE/RSJ
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Maurice F. Aburdene, Bucknell University; Marie Catherine Pizzorno, Department of Biology, Bucknell University; Alexander P Thompson, Bucknell University
Tagged Divisions
Computing & Information Technology
presentations.Each paper was reviewed by multiple students and faculty who provided both technical andeditorial comments.Homework Assignment:Would you please read the following articles?Anastassiou, D., "Genomic signal processing," Signal Processing Magazine, IEEE , vol.18, no.4,pp.8-20, Jul 2001.Afreixo, Vera, et al. "Genome analysis with inter-nucleotide distances." Bioinformatics 25.23(2009): 3064-3070.Would you please summarize your readings? Please prepare a PowerPoint presentation of yoursummary to share with the class.Class DiscussionAnastassiou, D. , "Genomic signal processing," Signal Processing Magazine, IEEE , vol.18, no.4,pp.8-20, Jul 2001.a) “Genomic signal processing (GSP) creates a paradigm shift.” What does Anastassiou mean byit?b
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
, the behavioral change is possible because the involved systems haveknowledge about other co-located wireless devices. Page 23.1244.13References1. Gang Zhao, Network Protocols and Algorithms, 2011, Vol. 3, No. 1, Wireless Sensor Networks for Industrial Process Monitoring and Control: A Survey.2. L. Q. Zhuang, K. M. Goh and J. B. Zhang, 1-4244-0826-1/2007 IEEE , The Wireless Sensor Networks for Factory Automation: Issues and Challenges.3. http://www.ni.com/white-paper/7142/en, published May 05, 20124. Javad Shakib, Mohammad Muqri ,118th Annual ASEE Conference, Session: AC 2011- 389, Wireless Technologies in Industrial
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Brian R. King, Bucknell University; Ashwin Satyanarayana, New York City College of Technology
Tagged Divisions
Computing & Information Technology
for a pattern to be "interesting". 2. Data Preprocessing. Real world data are generally (a) incomplete: lacking attribute values, lacking certain attributes of interest, or containing only aggregate data (b) noisy: containing errors or outliers and (c) inconsistent: containing discrepancies in codes or names. Certain basic preprocessing techniques are discussed here, including: • Data cleaning: fill in missing values, smooth noisy data, identify or remove outliers, and resolve inconsistencies. • Data integration: using multiple databases, data cubes, or files. • Data transformation: normalization and aggregation. • Data reduction: reducing
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Hoda Baytiyeh, The American university of Beirut
Tagged Divisions
Computing & Information Technology
' Percieved Satisfaction, Behavioral Intention, and Effectiveness of E-Learning: A Case Study of the Balckboard System." Computers & Education, Vol. 51, pp. 864-73.11. Marques, B. P., J. E. Villate, and C. V. Carvalho. (2011). "Applying the Utaut Model in Engineering Higher Education: Teacher's Technology Adoption." In 6th Iberian Conference on Information Systems and Technologies (CISTI), 1-6: IEEE.12. Sumak, B., G. Polancic, and M. Hericko. (2010). "An Empirical Study of Virual Learning Page 23.961.8 Environemnt Adoption Using Utaut." In Second International Conference on Mobile, Hybrid, and On-line
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
john pickard, East Carolina University; Te-shun Chou, East Carolina University; Philip J Lunsford II P.E., East Carolina University; John Spence
Tagged Divisions
Computing & Information Technology
Security Instruction. J. Educ. Resour. Comput. 6(4), 5. doi: 10.1145/1248453.1248458.2. Cao, X., Y. Wang. Wang, A. Carciula & Wang. 2009. Developing a multifunctional network laboratory for teaching and research. In Proceedings of the 10 th ACM conference on SIG-information technology education, 155-160. Fairfax, Virginia, USA: ACM.3. Curtis, S. 2011. World IPv4 Stocks Finally Run Out. TechWeek Europe.4. DoD HPC. 2012. IPv6 not Needed Here. Retrieved 11 December, 2012 from http://www.hpcmo.hpc.mil/cms2/5. EMC. 2012. EMC Academic Alliance. Retrieved 11 December, 2012, from https://education.emc.com/academicalliance.6. Hamza, M. K., Alhalabi, B., Hsu, S., Larrondo-Petre, M. M., and Marcovitz, D.M. 2003. Remote
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
Technology, Sensing, and Simulation (CE)Stanford CS221: ArtificialUniversity28 Intelligence: CS Principles and Techniques CS229- Machine Learning EE 294 A – AI EE 294 B – Probabilistic Models in AI EE 294C – Machine LearningUniversity of Genetic CE889-7-AU: Offering an MSc inEssex29(U.K.) Programming and ARTIFICIAL Computational
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Raul Soto Jr
Tagged Divisions
Computing & Information Technology
Paper ID #6513Capstone Experience: Multimedia Request AutomationDr. Mudasser Fraz Wyne, National University Ph.D. in Computer Science, from University of Birmingham U.K., M.Sc. in Engineering and B.Sc., in Electrical Engineering. He has been in academics for 24 years and currently serving as a Professor of Computer Science and Chair department of Computer Science, Information and Media Systems at School of Engineering, Technology, and Media, National University, San Diego, USA. He is also the program lead for BS in Information Systems program. He is serving as a commissioner for Computing Accredi- tation Commission
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
Paper ID #6904Application of Wireless Sensor Networks in Health Care SystemDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering elds, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, and Databases.Dr. Ali Sanati-Mehrizy Dr. Ali Sanati-Mehrizy is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. In July 2013, he will begin a