Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 30 results
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mariangely Iglesias Pena, Iowa State University; Stephen B. Gilbert, Iowa State University; Jamie Payton, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #22172The Research Experience for Undergraduates (REU) Principal Investigators(PI) Guide: Development of a Best Practices WebsiteMs. Mariangely Iglesias Pena, Iowa State University Mariangely Iglesias Pena is an MS student in Human Computer Interaction at Iowa State University’s Virtual Reality Applications Center. Her background is in industrial design, which drives her interest in interactive and web design.Prof. Stephen B. Gilbert, Iowa State University Stephen B. Gilbert received a BSE from Princeton in 1992 and PhD from MIT in 1997. He has worked in commercial software development and run his own company. He
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Vuk Marojevic, Virginia Tech; Antoni Gelonch-Bosch, Universitat Politècnica de Catalunya; Jeffrey Reed, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
,  Discuss the pros and cons of alternative technical solutions, and  Debate possible evolutionary paths for the standard being analyzed.We propose six learning stages with specific learning objective in each stage. These aredescribed in continuation.3.1 ContextThe student needs to get familiar with the standard and the standardization mechanics. Theinstructor thus provides a) A high-level description of the standard with certain details, describing theoretical concepts and employed technologies, identifying relevant working parameters and expected system behaviors, b) The standard specifications and the relationships among the main and auxiliary documents, and c) The introduction to the software framework to be used
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Justin Daniel Josey, Robert Morris University; Sushil Acharya, Robert Morris University
Tagged Divisions
Computing and Information Technology
. Utilizing facial landmarks could increasethe size of a training dataset enough to take advantage of the power of a CNN.References[1]. Elfenbein, H. A., & Ambady, N. (2002b). Predicting workplace outcomes from the ability to eavesdrop on feelings. Journal of Applied Psychology, 87(5), 963-971.[2]. Galati, D., Miceli, R., & Sini, B. (2001). Judging and coding facial expression of emotions in congenitally blind children. International Journal of Behavioral Development, 25(3), 268-278.[3]. Darwin, C. (2005). The expression of emotion in man and animals. New York, NY: Appelton. (Original work published 1872)[4]. Ekman, P. & Friesen, W. (1977). Facial Action Coding System. New Jersey: Lawrence Erlbaum Association[5
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Landon A. Braden; Scott Alexander Kaiser, Utah Valley University; Reza Kamali-Sarvestani, Utah Valley University; Afsaneh Minaie, Utah Valley University; Paul Weber, Utah Valley University
Tagged Divisions
Computing and Information Technology
microfabrication and nanotechnology. Boca Raton, FL: CRC Press, 2012. 10. B. Robertson, “Science 101: How Does an Electron Microscope Work?,” Science and Children, vol. 051, no. 01, pp. 76–78, 2013. 11. B. Smith, “The Differences Between Atomic Force Microscopy and Scanning Electron Microscopy,” AZoM.com, 01-Aug-2017. [Online]. Available: https://www.azom.com/article.aspx?ArticleID=11879. [Accessed: 01-Feb-2018]. 12. “Scanning Electron Microscopy (SEM),” Techniques, 26-May-2017. [Online]. Available: https://serc.carleton.edu/research_education/geochemsheets/techniques/SEM.html. [Accessed: 02-Feb-2018]. 13. G. Brake, “Buying a Pre-Owned SEM,” Lab Manager. [Online]. Available: http://www.labmanager.com
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona; Srikanth Venkatesan, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
program.The authors are planning to extend this study in future work to include more universities especiallythose interested in offering interdisciplinary programs and study the technical content of thecybersecurity-related courses offered by their respective departments.6. References[1] Juniper Research©, "Cybercrime will Cost Businesses Over $2 Trillion by 2019," 2015. [Online]. Available: https://www.juniperresearch.com/press/press-releases/cybercrime- cost-businesses-over-2trillion.[2] SANS ICS, "Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case," 2016. [Online]. Available: https://ics.sans.org/media/E- ISAC_SANS_Ukraine_DUC_5.pdf.[3] J. B.-S. H. R. R. a. U. Lee, "Anatomy of the Information Security Workforce
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andreas Febrian, Utah State University; Oenardi Lawanto, Utah State University; Kamyn Peterson-Rucker; Alia Melvin; Shane E. Guymon
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
number of images increased rapidly. (a) An image example of the first problem (b) A puzzle example for the second problemFigure 1. Problem examples. The second problem contains two bridge-puzzles, one easy and the other of mediumdifficulty; please see Figure 1 (b) for example. The puzzle rules are (a) to connect each island,which is represented as a circle, with the number of bridges shown inside the circle; (b) there canonly be two bridges connecting two islands; (c) a bridge must not overlap with other bridges orislands; and (d) there must be continuous link between all islands, which means there cannot beisolated island. Figure 1 (b) presents a solution that satisfies the puzzle’s rules. When solving the second problem, the
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mehmet Ergezer, Wentworth Institute of Technology; Bryon Kucharski, Wentworth Institute of Technology; Aaron Carpenter, Wentworth Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Cognitive Psychology, vol. 19, no. 4-5, pp. 494–513, 2007. [5] S. Freeman, E. O’Connor, J. W. Parks, M. Cunningham, D. Hurley, D. Haak, C. Dirks, and M. P. Wenderoth, “Prescribed active learning increases performance in introductory biology,” CBE-Life Sciences Education, vol. 6, no. 2, pp. 132–139, 2007. [6] S. Freeman, D. Haak, and M. P. Wenderoth, “Increased course structure improves performance in introductory biology,” CBE-Life Sciences Education, vol. 10, no. 2, pp. 175–186, 2011. [7] R. Heradio, L. de la Torre, D. Galan, F. J. Cabrerizo, E. Herrera-Viedma, and S. Dormido, “Virtual and remote labs in education: A bibliometric analysis,” Computers & Education, vol. 98, pp. 14–38, 2016. [8] M. Ergezer, B. Kucharski, and A
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Kari L. Jordan Ph.D., The Carpentries; Marianne Corvellec, Institute for Globally Distributed Open Research and Education (IGDORE); Elizabeth D. Wickes, University of Illinois at Urbana-Champaign; Naupaka B. Zimmerman, University of San Francisco; Jonah M. Duckles, Software Carpentry; Tracy K. Teal, The Carpentries
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Council for 2018.Dr. Naupaka B. Zimmerman, University of San FranciscoMr. Jonah M. Duckles, Software Carpentry Jonah Duckles works to accelerate data-driven inquiry by catalyzing digital skills and building organiza- tional capacity. As a part of the leadership team, he helped to grow Software and Data Carpentry into a financially sustainable non-profit with a robust organization membership in 10 countries. In his career he has helped to address challenging research problems in long-term technology strategy, GIS & remote sensing data analysis, modeling global agricultural production systems and global digital research skills development.Tracy K. Teal, The Carpentries c American Society for
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Laura Kay Dillon, Michigan State University; Michelle Slattery, Peak Research
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #22838A Flipped Active-learning Class to Support Diverse Students in a Large In-troduction to Programming ClassProf. Laura Kay Dillon, Michigan State University Laura Dillon is a professor and past Chair of Computer Science at Michigan State University (MSU); before joining MSU, she was a professor at the University of California, Santa Barbara. Her research centers on formal methods in software engineering, specification, and analysis of concurrent software systems. An ACM Distinguished Scientist, Laura has served on numerous editorial boards, program committees, funding panels, and advisory committees—most
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Farshid Marbouti, San Jose State University; Valerie A. Carr, San Jose State University; Belle Wei, San Jose State University; Morris E. Jones Jr., San Jose State University; Amy Strage
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
frequently mentioned difficulties with procrastination and timemanagement (Figure 1.b). (a) (b)Figure 1 - Word cloud representation of responses regarding (a) strengths and (b) weaknesses as students.Students were also asked to describe the most interesting fact or concept learned in a class insideand outside of their major, respectively. Figure 2.a represents a word cloud representation ofanswers pertaining to concepts learned inside their major. Interestingly, human-related topicswere by far the most common answer provided, a pattern that is likely quite different than thatobserved in students taking standard programming or engineering courses. With respect toconcepts
Conference Session
Crafting the Future of Computing Education in CC2020
Collection
2018 ASEE Annual Conference & Exposition
Authors
Stephen T Frezza, Gannon University; Arnold Neville Pears, Uppsala University; Marisa Exter, Purdue University, West Lafayette (College of Engineering); Barry M. Lunt, Brigham Young University
Tagged Divisions
Computing and Information Technology, Software Engineering Division
Paper ID #23289Crafting the Future of Computing Education in CC2020: A WorkshopDr. Stephen T Frezza, Gannon University Deacon Steve Frezza, PSEM is a professor of Software Engineering and chair of the Computer and In- formation Science department at Gannon University in Erie, PA. His research interests include Global Software Engineering, Affective Domain Learning, Engineering Education Research, as well as Philos- ophy of Engineering and Engineering Education. He is regularly involved in supporting the regional entrepreneurial ecosystem, as well as projects that serve the regional community. He is an active member
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
Paper ID #24012Designing Undergraduate Data Science Curricula: A Computer Science Per-spectiveDr. Predrag T. Tosic, University of Idaho Predrag Tosic is an early mid-career researcher with a unique mix of academic research, industrial and DOE lab R&D experiences. His research interests include AI, data science, machine learning, intelli- gent agents and multi-agent systems, cyber-physical/cyber-secure systems, distributed coordination and control, large-scale complex networks, internet-of-things/agents, and mathematical and computational models and algorithms for ”smart” transportation, energy and other grids. He is
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Shanon Marie Reckinger, Stanford University; Bryce E. Hughes, Montana State University
Tagged Divisions
Computing and Information Technology
of educational research, 76(1), 1-62.Feden, P. D., & Vogel, R. M. (2003). Methods of teaching: Applying cognitive science to promote student learning: McGraw-Hill Humanities, Social Sciences & World Languages.Felder, R. M., & Brent, R. (2005). Understanding student differences. Journal of engineering education, 94(1), 57-72.Felder, R. M., & Silverman, L. K. (1988). Learning and teaching styles in engineering education. Engineering education, 78(7), 674-681.Felder, R. M., & Soloman, B. A. (n.d.). Index of Learning Styles. Retrieved from http://www.ncsu.edu/felder-public/ILSpage.html.Felder, R. M., & Soloman, B. A. (n.d.). Learning styles and strategies. Retrieved from
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yun Dai, University of Southern California; Tianmeng Li, University of New South Wales; Ang Liu, University of New South Wales; Stephen Lu, University of Southern California
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
simplest case, given a new learning concept, ifstudent A considers it easy to understand, while student B considers it difficult to interpret,then the two students can be matched to learn from each other (i.e., student A teaches studentB). In a more complex scenario, students with diversified backgrounds can co-construct newcontextual understandings through peer-to-peer interactions. Within a small class where theinstructor knows every student well enough, peer instruction can be directly facilitated by theinstructor by means of manually forming study groups. However, this is no longer feasiblefor a large class that enrolls more than 100 students.Against this background, this paper presents a peer-to-peer learning platform (hereafterreferred to as
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Deng Cao, Central State University; Cadance Lowell, Central State University; Augustus Morris, Central State University
Tagged Divisions
Computing and Information Technology
, D Anguelov, D Erhan, V Vanhoucke, A Rabinovich. Going Deeper with Convolutions, Computer Vision and Pattern Recognition, 2015.7. C Szegedy, V Vanhoucke, S Ioffe, J Shlens, Z Wojna. Rethinking the Inception Architecture for Computer Vision, Computer Vision and Pattern Recognition, 2015.8. A G. Howard, M Zhu, B Chen, D Kalenichenko, W Wang, T Weyand, M Andreetto, H Adam. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications, Computer Vision and Pattern Recognition, 2017.9. Y Shibberu. Introduction to Deep Learning: A First Course in Machine Learning, ASEE Annual Conference & Exposition, Columbus, Ohio, 2017. https://peer.asee.org/2858210. TensorFlow Team, Installing Tensorflow on Windows
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andrew R. Schmitt, Metropolitan State University; Theresa Chasar, Newell Brands; Mangaya Sivagnanam, Ingersoll Rand; Faisal Kaleem, Metropolitan State University
Tagged Divisions
Computing and Information Technology
and indirect (amplified and/or reflected) attack methods 6. Quantifying the number of IoT bots in a botnet of unknown composition 7. Determining the resiliency of target systems during an attack and quantifying the number of devices a target system can withstand while remaining fully functionalAppendix A: Infrastructure Hardware DetailsAppendix B: Python ScriptsServer Side:#Script to establish a server side socket to test maximum bandwidth based on hardware resources#Using a file to send data for an extended period of timeimport socketimport os#VariablesB_size = int(raw_input("Enter the buffer size:\n"))Bind_port = int(raw_input("Enter the port number to connect on:\n"))#Establish the server and listen for connectionsdef
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Karen H. Jin, University of New Hampshire; Michael Jonas, University of New Hampshire; Christopher David LeBlanc, University of New Hampshire; Theodore Sean Tavares, University of New Hampshire
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #23065Modernizing Capstone Project: External and Internal ApproachesProf. Karen H. Jin, University of New Hampshire Karen H. Jin has been an Assistant Professor of Computer Science in Computing Technology program at UNH Manchester since Spring 2016. She previously taught as a lecturer for over ten years in University of Windsor and Dalhousie University. Her interest in computer science education research focuses on devel- oping new empirically supported theories and practices in teaching programming, software engineering and project-based learning with industrial relevance. She received her Ph.D. and M.Sc. in
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Nikole Harper; Hasan Muqri; Brian Keith Wesr Sr.
Tagged Divisions
Computing and Information Technology
the probabilityat the given value or less. With this information, all the needed probabilities can becalculated. The syntax of the formula is =NORM.DIST( xo, µ, σ, TRUE) where, xo isthe value of the continuous random variable, µ is the mean and σ is the standarddeviation. The value TRUE request the cumulative probability for all x values in therange from -∞ ≤ x ≤ xo.Normal Distribution EXCEL Problem 1:The mean incubation time for a type of fertilized egg kept at 100.1°F is 21 days.Suppose that the incubation times are approximately normally distributed with a standarddeviation of 2 days.(a) What is the probability that a randomly selected fertilized egg hatches in less than 19 days?(b) What is the probability that a randomly selected
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Raja S. Kushalnagar, Gallaudet University; Gary W. Behm, Rochester Institute of Technology; Kevin T. Wolfe; Peter Yeung; Becca Dingman; Shareef Sayel Ali, Center on Access Technology ; Abraham Glasser, Rochester Institute of Technology; Claire Elizabeth Ryan
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
opportunity to ask and get answers to anyquestions they had about their participation. The surveys were administered immediately afterthey viewed the captions through the specified caption display method. The participants wereassigned identification numbers to maintain confidentiality. Figure 4: A typical layout of the evaluation.All participants viewed three presentations in a randomized order. We randomized the order ofpresentations viewed by the participants to counterbalance them. After each presentation, themoderators stepped in and set up the system to display the next presentation. The first set of 5participants viewed presentation A, “Plastic Bag Ban in Bali” first, then B, “Black Lives MatterFounders”, and last, C
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State University; Xiangyan Zeng, Fort Valley State University; Chunhua Dong, Fort Valley State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
order to increase the retention rate by 20% (6.5% per project year) from the base of 50.4% [4], starting spring 2018. Performance Indicators: o By September of each project year, The retention rate is expected to increase by 6.5% o By April 2020, at least 50% of CS graduating students will have a grade of B or better in the programming subject of computer science exit exam conducted by ETS. 3. Integrate an undergraduate research program to involve at least 12-20 junior and senior computer science students during the last 2 years of project, starting fall 2018. Performance Indicators: o Involve at least 3-5 students per semester in
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Michael Oudshoorn, Northwest Missouri State University; Rajendra K. Raj, Rochester Institute of Technology; Stan Thomas, Wake Forest University; Allen Parrish, United States Naval Academy
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Section 6.1.4 Accreditation Requirements for Computing ProgramsFor the most part, all four commissions of ABET follow a harmonized set of accreditation require-ments. These requirements differ in Student Outcomes (“describe what students are expected toknow and be able to do by the time of graduation”), Curriculum and Faculty criteria, as these tendto be most connected with the program’s discipline. The computing accreditation criteria are thuscomposed of eight categories divided into two parts: (a) general criteria, and (b) program-specificcriteria. The CAC program-specific criteria require that the general criteria be met, and provide upto three additional requirements for criterion 3 (student outcomes), criterion 5 (curriculum) and cri
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Emil H. Salib, James Madison University; John David Lester
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. Shenker, and J. Turner, “Openflow: enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008.[17] “Openflow specifications,” Retrieved March 18, 2018.[18] B. Pfaff, J. Pettit, T. Koponen, E. Jackson, A. Zhou, J. Rajahalme, J. Gross, A. Wang, J. Stringer, P. Shelar, K. Amidon, and M. Casado, “The design and implementation of open vswitch,” NSDI’15 Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, pp. 117–130, May 04 - 06, 2015.[19] “The Open vSwitch Database Management Protocol- RFC7047.” https://tools.ietf.org/html/rfc7047, 2012.[20] “Open vSwitch Database Schema.” http://openvswitch.org/ovs-vswitchd.conf.db.5.pdf, 2017.[21] “POX Wiki
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Dale Drummond, East Carolina University; Philip J. Lunsford II, East Carolina University; Ciprian Popoviciu, Nephos6, Inc.
Tagged Divisions
Computing and Information Technology
, Microsoft Certificated Professional, EMC Information Storage and Management, IPv6 Forum Certified Engineer (Gold), IPv6 Forum Certified Trainer (Gold), and Cisco Certified Academy Instructor. Dr. Pickard received his Ph.D. in Technology Management at Indiana State University. He also holds an MBA from Wayland Baptist Uni- versity and a B.S. in Professional Aeronautics from Embry-Riddle University. Research interests include: IPv6, IPv6 adoption, wireless sensor networks, and industry-academia partnerships.Mr. Dale Drummond, East Carolina University Dale Drummond is an Undergraduate Student at East Carolina University in the College of Engineer- ing and Technology. He is currently pursuing his Bachelor of Science in
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Arshia Khan, University of Minnesota, Duluth
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
to Increase Engagement in the Classroom: science. Communications of the ACM (Jun. 2001), 44(6), A Case Study in Science and Engineering; Proceedings of pp.27-30. DOI= http://doi.acm.org/10.1145/376134.376145 the American Society for Engineering Education ASEE;[10] Roberts, E.S., Kassianidou, M. and Irani, L., 2002. Columbus, OH; June 2017 Encouraging women in computer science. ACM SIGCSE [24] Khan, A. Egbue, O, Palkie, B. (2016); Active learning: Bulletin – Women and Computing (Jun. 2002), 34(2), 84-88. Engaging students to maximize learning in an online course; DOI= http://doi.acm.org/10.1145/543812.543837 EJEL- Electronic Journal of e
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Zhen Wu, University of Colorado, Boulder; Christopher Lynnly Hovey, University of Colorado, Boulder; Leisa D. Thompson, University of Virginia
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
was subsequently excluded from any application or acceptance calculation, but was included in new enrollments, declared majors, and graduations. b Net Increase Percent: 100 percent equals no change, above 100% indicates a net increase; for example, 122% represents a 22% increase above the pre-program year. Values ≥ 200% represent a doubling (or more) of raw numbers for the category and group represented in the row.More salient to this study, substantial growth was also observed in the number of women’sapplications, acceptances, new enrollments, and declared majors across the seven schools.Comparing the pre-program year (AY 2011-2012) with the post-program year (AY 2014-2015),both the number of women who applied
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Umit Karabiyik, Sam Houston State University; Naciye Celebi; Faruk Yildiz, Sam Houston State University; James Holekamp, Sam Houston State University; Khaled Rabieh, Sam Houston State University
Tagged Divisions
Computing and Information Technology
Hardware/Software, report presentation, Started the project Student A ECET purchasing, data Fall 2017 Sp, Su, Fa 2017 collection and analyzing Hardware, Worked on the Student B ECET purchasing, manual Summer 2017 project Sp, Su 2017 preparation
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University
Tagged Divisions
Computing and Information Technology
Paper ID #21251Teaching Directory Services: Topics, Challenges, and ExperiencesDr. Yu Cai, Michigan Technological University Dr. Yu Cai is an associate professor and program chair in the Computer Network and System Adminis- tration (CNSA) program at the School of Technology, Michigan Technological University. His current research interests include cyber security and medical informatics. He is particularly interested in applying his research and techniques to real-life applications. He has been a consultant to many companies includ- ing IBM and Ford. Dr. Cai serves in editorial boards of several international journals. He
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
Paper ID #24002Teaching Theoretical Computer Science and Mathematical Techniques to Di-verse Undergraduate Student PopulationsDr. Predrag T. Tosic, University of Idaho Predrag Tosic is an early mid-career researcher with a unique mix of academic research, industrial and DOE lab R&D experiences. His research interests include AI, data science, machine learning, intelli- gent agents and multi-agent systems, cyber-physical/cyber-secure systems, distributed coordination and control, large-scale complex networks, internet-of-things/agents, and mathematical and computational models and algorithms for ”smart” transportation
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Reza Kamali-Sarvestani, Utah Valley University; Brian Durney, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #23139Magnitude Museum: Game-based Learning for Nanosizes, Dimensions, andNanotechnology TerminologyDr. Reza Kamali-Sarvestani, Utah Valley UniversityBrian Durney, Utah Valley University Brian Durney teaches computer science at Utah Valley University. His research interests are educational games and game AI. c American Society for Engineering Education, 2018 Magnitude Museum: Game-Based Learning for Nanosizes, Dimensions, and Nanotechnology TerminologyAbstractMagnitude Museum is an educational game that helps students develop a sense of scale andunderstand the
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
proper skills to operateand manage their networks. Broadband wireless networks and big data systems are twoimportant technologies that current STEM students need to learn, comprehend and master tosatisfy the market needs. Design and implementation of an academic big-data system andbroadband wireless testbed for instruction and research purposes is a difficult task. In this work,challenges facing the design and implementation of a mobile networks and big-data lab areevaluated. This work aims at providing a comprehensive reporting about an experience gainedfrom designing and implementing an academic lab of big-data system used for broadbandwireless networks traffic analysis and management. Challenges facing the project team duringthe