behalf of women), all at Purdue University. This year she is a visiting research scientist in the Weldon School of Biomedical Engineering, visiting faculty in the Center for Entrepreneurship, and a visiting Fellow in the Center for Education and Research in Information Security at Purdue University.Dr. Carla B. Zoltowski, Purdue University, West Lafayette Carla B. Zoltowski, Ph.D., is Co-Director of the EPICS Program at Purdue University. She received her B.S. and M.S. in electrical engineering and Ph.D. in engineering education, all from Purdue University. She has served as a lecturer in Purdue’s School of Electrical and Computer Engineering. Dr. Zoltowski’s academic and research interests broadly include the
Kee Wook Lee is a senior student at Purdue University, West Lafayette, IN, majored in electrical engi- neering.Dr. David B Nelson, Purdue University, West Lafayette David B. Nelson is Associate Director of the Center for Instructional Excellence at Purdue University. He received his Ph.D in World History from the University of California, Irvine in 2008. David has been involved in many educational research projects at Purdue, including published worked in the programming education, student engagement and academic performance in dynamics engineering courses, and educational modalities in engineering, technology and economics.Dr. Yung-Hsiang Lu, Purdue University Yung-Hsiang Lu is an associate professor in the School
Professional, EMC Information Storage and Management, IPv6 Forum Certified Engineer (Gold), IPv6 Forum Certified Trainer (Gold), and Cisco Certified Academy Instructor. Dr. Pickard received his Ph.D. in Technology Management at Indiana State University. He also holds an MBA from Wayland Baptist Uni- versity and a B.S. in Professional Aeronautics from Embry-Riddle University. Research interests include: IPv6, IPv6 adoption, wireless sensor networks, and industry-academia partnerships.John B. Southworth, East Carolina University John Brooks Southworth received a B.S. degree in electronics/computer networking from East Carolina University, Greenville, NC, in 2002 and an M.S. degree in computer networking management from East
purpose, the Message-Passing Interface 19, 41 (MPI) library andOpenMP can be used. As a warm-up exercise, we can assign students with matrix multiplicationbenchmark. In this problem, we assume that we have a large matrix A and B to be multiplied andthe result to be stored in matrix C. By varying the dimension of matrices A and B, as well as thenumber of processors, we can obtain a well-designed exercise where students can observe thefollowing: Writing a simple parallel program to be executed on cloud using HPCaaS Partitioning the task between the existing number of Virtual Machines (VM) allocated for this exercise Scheduling assignment task of multiplication to virtual processors Choice of static vs
learning). TABLE 1. ABET student outcomesABET student outcomes(a) An ability to apply knowledge of computing and mathematics appropriate to the program’sstudent outcomes and to the discipline(b) An ability to analyze a problem, and identify and define the computing requirementsappropriate to its solution(c) An ability to design, implement, and evaluate a computer-based system, process, component,or program to meet desired needs(d) An ability to function effectively on teams to accomplish a common goal(e) An understanding of professional, ethical, legal, security and social issues and responsibilities(f) An ability to communicate effectively with a range of audiences(g) An ability to analyze the local and global
effective risk mitigation is possible. We have discussed severalapproaches to systems defense based on a combination of policy, technology and training 18 andspecified simple, yet effective strategies to disable currently known malware payload attacks,propagation and delivery vectors.References1. Dwan B. The Computer Virus — From There to Here. Computer Fraud & Security. 2000 [accessed 2014 Dec1];2000(12):13–16. http://www.sciencedirect.com/science/article/pii/S13613723001202632. Verizon. 2014 DATA BREACH. USA; 2014.3. McAfee. Net Losses : Estimating the Global Cost of Cybercrime. USA; 2014.4. ThreatScape. KAPTOXA Point-of-Sale Compromise. USA; 2014.5. Huq N. PoS RAM Scraper Malware - Past, Present, and Future. USA; 2014.6. HackSurfer. Special
IEEE Multimedia Communications Technical Committee. He obtained the Ph.D. from the Department of Electrical Engineering at Stanford University.Prof. Thomas J. Hacker, Purdue University, West Lafayette Thomas J. Hacker is an Associate Professor of Computer and Information Technology at Purdue Univer- sity in West Lafayette, Indiana. His research interests include cyberinfrastructure systems, high perfor- mance computing, and the reliability of large-scale supercomputing systems. He holds a PhD in Computer Science and Engineering from the University of Michigan, Ann Arbor. He is a member of IEEE, the ACM, and ASEE.Dr. Carla B. Zoltowski, Purdue University, West Lafayette Carla B. Zoltowski, Ph.D., is Co-Director of
the robot around. Tomove the robot, every button is assigned with an action listener and when they are pressed thecommand is send to the robot which has also been implemented using LEJOS API. Beforemoving the robot, the actuators of the robot needs to be initialized. As our robot has threemotors- A, B, C which are marked as left, right and back motors and all three motors needs to beinitialized before moving. left = con.ev3.createRegulatedMotor("A", 'L'); right =con.ev3.createRegulatedMotor("B", 'L'); back = con.ev3.createRegulatedMotor("C", 'L');After that, the robot is moved in different directions as follows © American Society for
should demonstrate the following learning outcomes out of the course outcomes: a. Provide an understanding of how a computer draws the fundamental graphics primitives - lines and filled polygons in both 2-D and 3-D. b. Use the facilities provided by a standard API to express basic transformations such as scaling, rotation, and translation. c. Implement simple procedures that perform transformation and clipping operations on a simple 2-dimensional image. d. Discuss the 3-dimensional coordinate system and the changes required to extend 2D transformation operations to handle transformations in 3D. e. Explain the concept and applications of each of these techniques
v3 requiredknowledge of IT professionals and support by management. Adopting and implementing aprescribed process model such as ITIL v3 depends on several factors such as leader’s supportand commitment, IT professional knowledge, and a joint business IT plan involve stafftraining. This study confirmed that successful ITIL adoption requires both business leadersand IT leaders to work together to form a joint plan that most suitable and benefits theorganization.References1. Andersen, B., & Fagerhaug, T. (2001, August). Advantages and disadvantages of using predefined process models. Proceedings from International Working Conference on Strategic Manufacturing, Aalborg, Denmark. Retrieved from http://www.prestasjonsledelse.net
collaborativeeffort between FIU, Florida A&M University (FAMU), Miami University (MU) and NorthDakota State University (NDSU) [13]. The NSF Course, Curriculum, and LaboratoryImprovement (CCLI) Phase I project (first version of WReSTT) had the following objectives: (a)create learning materials on testing tools, (b) increase the number of students who have access totesting tool tutorials, and (c) train instructors on how to use testing tools and WReSTT in theclassroom. WReSTT Home Page Testing Course
in four main categories –system level design for the mobile platform (Android);API level security analysis (PID recognition); reverse engineering based security analysisincluding both static and dynamic analysis; traffic engineering. Table I. shows the overall list ofcurrent mobile computing labs and security analysis labs related to mobile and pervasivecomputing in the past two years. Each lab will be introduced in the following subsections. Eachlab contains the objectives, description, steps, and some sample code segments. Some labs had Figure 2. Snapshots for the information collection (a) and phone make lab (b)been updated based on past implementation.Information Collection Android AppThis is an Android app
&MUniversity (FAMU) [5]. The NSF Course, Curriculum, and Laboratory Improvement(CCLI) Phase I project had the following objectives: (a) create learning materials ontesting tools, (b) increase the number of students who have access to testing tool tutorials,and (c) train instructors on how to use testing tools and WReSTT in the classroom.WReSTT-CyLE is a NSF Transforming Undergraduate Education in Science (TUES) IIproject that aims to provide a cyberlearning environment that facilitates the improvementof students’ conceptual understanding and practical skills in software testing. The maingoals of this project are to create new learning materials and develop faculty expertise tosignificantly increase the number of undergraduate students that
Paper ID #15358Leveraging Online Lab Development: A New Paradigm to Offer EducationalLab Infrastructure as a Cloud ServiceDanilo Garbi Zutin, Carinthia University of Applied Sciences Danilo G. Zutin is currently a Senior Researcher and team member of the Center of Competence in Online Laboratories and Open Learning (CCOL) at the Carinthia University of Applied Sciences (CUAS), Vil- lach, Austria, where he has been engaged in projects for the development of online laboratories, softtware architectures for online laboratories and online engineering in general. Danilo is author or co-author of more than 30 scientific papers
Paper ID #15299Capstone Projects in a Computer Engineering Program Using ArduinoDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. She received her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science Department at Utah
Paper ID #14425Developing an Android-Based Layer 3 Switch as a Senior ProjectMr. Pat Smith, Oklahoma Christian University of Science and Arts Mr. Pat Smith lives in Edmond Oklahoma. He has been married for 32 years to Dr. Virginia Smith, a leading expert and author in the field of higher education. He has a son who is a physician and daughter who teaches physics and chemistry. Mr. Smith enjoys long distance road cycling and board games. He gained his undergraduate degree at the University of Oklahoma in Computer Engineering in 1984. Following this he worked in industry for Conoco Inc, Du Pont, and Cisco Systems. At Cisco
interests include networking and security. I also enjoy teaching emerging technology classes and working with the Internet of Things. My background includes twenty years of IT experience with both the private and public sectors. I try to bring real-world examples into my classroom, and provide students with a well-rounded view of expectations in the workforce.Miguel Vega-Herrera c American Society for Engineering Education, 2016A Comparison of Network Simulation and Emulation Virtualization ToolsAbstractPacket Tracer (PT) is an official Cisco software simulator for exercising Cisco networkequipment. Graphical Network Simulator (GNS3) is a free emulator software which allowsrunning actual networking software
Paper ID #14660Implementation and Evaluation of a Second Language Acquisition–BasedProgramming CourseDr. Christina Frederick, Embry-Riddle Aeronautical University - Daytona Beach Dr. Frederick is currently a Professor and Graduate Program Coordinator in the Human Factors and Systems Department at Embry-Riddle Aeronautical University in Daytona Beach, Florida. Dr. Frederick received her Ph.D. in 1991 from the University of Rochester with a major in Psychological Development. She previously taught at the University of Rochester, Southern Utah University and the University of Central Florida. In 2000, Dr. Frederick joined the
Paper ID #17202Enhancing Software Engineering Curricula By Incorporating Open, Data-Driven Planning MethodsMr. John (Lalit) Jagtiani, University of Bridgeport Mr. Lalit (John) Jagtiani is currently a Ph.D. candidate focused on Technology Management at the Uni- versity of Bridgeport, School of Engineering. His research interests include software technology manage- ment, software metrics, technology change management, and technology risk management. Mr.Jagtiani has 25+ years of industry experience with technology management and strategic business solutions. He currently serves as a consultant to several organizations and
Paper ID #15528Case Study: The Unified State Exam and Other Admission Tests as a Predic-tor of Academic Performance at the IT UniversityDr. Tanya Stanko P.E., Innopolis University Tanya Stanko is a Vice-Provost of Education at Innopolis University. She specializes in launching new Universities from scratch, including setting up curricula and polices, recruiting faculty and students. She holds PhD in Computational Aeroacoustics from the University of Leeds and worked as researcher at Technical University of Munich. Her current research interests include investigation of the professional competencies, gender diversity in
Paper ID #17134Computer Science Curriculum Redesign at Fort Valley State UniversityDr. Masoud Naghedolfeizi, Fort Valley State College Dr.Masoud Naghedolfeizi is a senior professor in the Department of Mathematics and Computer Science at Fort Valley State University. His academic background includes a B.S. in Mechanical Engineering with minor in instrumentation and control, an M.S. in Metallurgical Engineering, and M.S. and Ph.D. in Nuclear Engineering. Dr. Naghedolfeizi’s research interests include instrumentation and measurement systems, applied articial intelligence, information processing, and engineering education
trepidation when interacting under the pretext of lying or taking on a role. 5. Help establish a desire for lifelong learning and how it is essential to continually improve and learn as a cybersecurity professional.Lecture TopicsThe classroom’s curriculum was designed around the textbook chosen for the class, SocialEngineering: The Art of Human Hacking. Other topics in the class have been included afterreviewing more Social Engineering books and consulting with cybersecurity professionals tolearn what skills are valuable. 1. Intro a. What is Social Engineering? b. Overview of the Course c. Sign Ethics Agreement 2. Influence a. The Five Fundamentals of Influence and Persuasion b. Discuss
realizes that his/her friend has a copy of the final exam questions. a. Pat should report this to his/her instructor. b. Pat may obtain a copy of the questions from her/his friend by promising not to report the incident. c. Pat should keep quiet about the matter. It is not her/his business. d. They should sell the questions to other students in the class. (Baylor University: “Workplace Ethics Questionnaire,” 2015)ANALYSIS OF DATAThe survey was administrated at the start and at the end of term. The comparison between thesets of results are also shown in the graphs and data tables.The raw percentage data sets of the comparisons between computer science (CS) and non-computer science majors (others) are found below. The results
, and a quick start guide totaling approximately$80+tax. The model of Raspberry Pi used for this project is the Raspberry Pi 2 Model B, which“replaced the original Raspberry Pi 1 Model B+ in February 201516.” Shared features includefour USB ports, 40 general-purpose input/output (GPIO) pins, full High-Definition MultimediaInterface (HDMI) video output, Ethernet port, combined 3.5mm audio jack and composite video,a camera serial interface (CSI), display interface (DSI), Micro SD card slot, and VideoCore IV3D graphics core. Raspberry Pi 1 Model B+ has a Broadcom BCM2835 700 MHz ARM11processor, whereas the Raspberry Pi 2 Model B has an updated Broadcom BCM2836 900 MHzquad-core ARM7 processor, which boosts performance approximately six times its
GUI for user monitoring.Images of completed mobile platform are shown in Figure 4. (a) Overall system. (b) Close up view of electronics. Figure 4: Images of the mobile platform.ASEE Annual Conference 2016 New Orleans, USDesigning a GUI to provide users with excellent visual composition is a vital part of remotetestbed designs. The goal is to improvise and enhance the visual experience between the humaneye and computer. Considering the issues for an effective GUI, HTML was used as a softwaretool for testbed GUI development. Along with HTML, Cascaded Style Sheets (CSS) wereprovided to improve the overall visual experience. The
Science Foundation (CNS #1138469, DRL#1417835, and DUE #1504293), the Scott Hudgens Family Foundation, and the Arthur M. BlankFamily Foundation.References[1] J. M. Wing, “Computational thinking and thinking about computing,” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 366, no. 1881, pp. 3717–3725, 2008.[2] M. Guzdial and E. Soloway, “Teaching the Nintendo generation to program,” Commun. ACM, vol. 45, no. 4, pp. 17–21, Apr. 2002.[3] A. Bruckman, M. Biggers, B. Ericson, T. McKlin, J. Dimond, B. DiSalvo, M. Hewner, L. Ni, and S. Yardi, “‘Georgia computes!’: improving the computing education pipeline,” in Proceedings of the 40th ACM technical symposium on Computer
courses. The modules are designed to be stand-alone mini-lecturesthat describe how CS is relevant in other disciplines/fields such as cyber warfare, biology,electronic voting, epidemics, etc. These modules would be supported by class projects thatreinforce such paradigms. Teams of faculty in the STEM Faculty Learning Community willdevelop course modules in collaboration with CS faculty who coordinate entry- level classes.5. Study MethodologyThis study is composed of two efforts: (a) developing the intervention- the course modules thatwill be integrated into particular introductory computer science classes and (b) studying the impactof those modules upon students’ perceptions of computer science through surveys.In the first effort, it has been
also include socialactivities to show that college can be fun, too.The Computer and Information Technology department actively participates in these outreachprograms. A variety of activities designed by faculty, undergraduate, and graduate students havebeen used in these sessions over the past ten years. Some example sessions included the use ofthe following tools: 1. Web page development (static HTML to dynamic ASP.NET) 2. Social media tools through a Twitter-enabled game 3. Programming languages a. Alice b. Scratch c. Scratch 4 Arduino d. C# 4. Physical computing a. Arduino board b. Phoenix Contact Nanoline microcontrollerThe remainder of this paper will present the
programming language for everyone. In: WesternCanadian Conference on Computing Education. (2003)7.Harvey M. Deitel, H. M. (Editor), Deitel P. J., Liperi J. P., Wiedermann B. A., P. Liperi, J. P.,"Python, How to Program", Prentice Hall, Feb. 20028. Martelli, A., Ascher D. (eds): "The Python Cookbook", O'Reilly, 20039. Python Programming In A Day & C++ Programming Professional Made Easy (Volume 43) by Sam KeyCreate Space Independent Publishing, 2015, ISBN-13:9781511776752
number of simultaneously running guest machines is greatlydependent upon the host machine specification. Therefore, the higher end system specification ispreferred in hypervisor-based virtual machine. However, it is beneficial to run the application indifferent types of OS since it allows creating and running different type of OS in each guestmachine. Each guest machine has its own resources and OS in hypervisor-based virtual machine.3.2 Container-based virtual machineUnlike hypervisor-based virtual machine running a full OS, container-based is running on the topof the existing OS as shown in Figure 1(b), which provides the isolation using a kernelnamespace feature in Linux. The basic idea of container-based virtualization concept is tominimize