, "SimPlus: An Experimental Simulation Tool", in Proceedings of the 2004 American Society for Engineering Education Annual Conference (ASEE'04), June 2004, Salt Lake City, Utah. Session 2420.8. Rajaei, H. Eid E., Kannungo, D., Ringerberg, J., 2011, "JSimPlus: A Tool for Teaching Simulation Techniques", in the 14th Communications and Networking Simulation Symposium, CNS'11, sponsored by ACM/SCS, April 4-11, Boston.9. Law, A. 2007, “Simulation Modeling & Analysis”, 4th Ed, McGraw Hill10. Harrell C, Ghosh B, and Bowden R, 2012 “Simulation Using ProModel”, 3rd Ed, McGraw Hill11. Chamberlain T, 2013, “Learning OMNeT++, Packt Publisher12. Virdis A, 2019 “Recent Advances in Network Simulation, the OMNeT Environment and its
demand area ofcybersecurity applications. It will offer collaboration among three colleges (CoE, CoS, CBA) toleverage from delivered student knowledge transfer and deliver an effective, two-semester projectbased course.CLASS OBJECTIVES & RESEARCH QUESTIONSThe class objectives are summarized into four folds: 1. Student engagement in interdisciplinary work of frontier technologies and its cybersecurity related aspects. a. Build interdisciplinary teams comprising of three to six students from the Computer Science (CS), Electrical and Computer Engineering (ECE), and Computer Information Systems (CIS) departments to get involved in projects studying frontier technologies and their cybersecurity aspects. b
). The resized image is either saved for database, or processed by a real timeface recognition system, which will be discussed in the following sections. The basics of facedetection using Haar Cascades can be found at [8]. Fig.2 shows the web camera screen with adetected face frame and saved face image (96x96 pixels). (a) (b) Fig.2 Fact detection: (a) video screen with a green rectangle identifying a detected face; (b) cropped face image for database or face recognition.2.3 Face Recognition After the face detection, we can assume that the images either for database or for recognitionare face-concentrated and resized to 96x96 pixels (e.g. Fig.2
objectives are to keep themodules complete and independent so that they can be easily integrated into the courses. Eachmodule package consists of instructions, lab exercises and solutions, and assessment methods.The modules were also designed to incorporate the National Initiative for CybersecurityEducation (NICE) Cybersecurity Workforce Framework (NCWF) topics of Cyber Threat andVulnerabilities, Risk Management and Software Reverse Engineering [9].The purpose of this paper is a) to describe a set of six security modules that was implemented ina Computer Science 1 course during the fall semester of 2019 at Texas A&M University-SanAntonio and b) to report the results of evaluating teaching effectiveness of implementing thesecurity modules with
late IT project or one thatgoes above the projected budgeted amount can be very detrimental to the organization’s success.Whereas, the duties of the CRO differ slightly as they are typically responsible for many of thesame duties as the CIO in terms of understanding the corporate landscape and ongoing securityprojects. However, their field of expertise is more of governance. As data and devices converge,the role of the CRO and their management responsibilities seem to vary across the landscapewithin the given literature. Nevertheless, the CRO has become a mainstay within the executiveleadership team, and according to Karanja and Rosso [6], the CRO provides a voice within threemanagerial roles: (a) interpersonal, (b) informational, and (c
outcome.Faculty also provide a table for each course that shows a summary of the raw data for the directevidence that each assessment instrument generates. Let’s take CSET 4100 Server-SideProgramming as an example. An assessment on the need for continuous improvement couldinclude: a) Questions in two homework assignments involving Java web application anddeployment to reveal mastery of CAC and ETAC outcome 4; b) Two programming assignmentsinvolving Java server-side scripting designed to reveal mastery of CAC and ETAC outcome1. Figure 1: University of Toledo CSET Curriculum Computer Science & Engineering Technology Curriculum - Full Time (Effective Fall 2013
included bothvoice and screen capture of the pdf notes. During the lecture, online students were muted but theycould type questions using the chat feature. Zoom also facilitated online office hours which wereheld Tuesday through Thursday of each week (on the same days assignments were due.) Duringthese sessions, students could connect by voice (through computer microphones or by calling in)or through the chat feature.Student Performance and FeedbackAlmost all students excelled in the class, with the lowest overall grade awarded at a B-. Thisdid not indicate they found it too easy. Eighty-one percent of the students self-reported workingover 10 hours per week for the class (10+ hours was the highest option) and over half of themmentioned either a
, latency, packet ACL Storage Security Queues congestion control loss monitoring Science DMZ sFlow / Netflow capability Friction-free path L1 L2/L3 L4 L5 Security Non friction-free path (a) (b)Fig. 3. (a) A Science DMZ co-located to the regular enterprise network. Notice the absence
Paper ID #30661Cybersecurity Awareness and Training Through a Multidisciplinary OSINTCourse ProjectAlyssa Mendlein, Temple University Alyssa is a PhD student in the Department of Criminal Justice at Temple University. She earned a Bachelor of Arts in Psychology from Boston University and a Master of Philosophy in Criminological Research from the University of Cambridge. She is now working on an NSF CAREER grant for Dr. Aunshul Rege, exploring adversarial decision-making and cybersecurity education innovation.Ms. Thuy-Trinh Nguyen, Temple University Trinh is a PhD student in the Department of Criminal Justice at Temple
Paper ID #29604Deploying a Network Management Overlay for Education Video Conferenc-ingServicesCiprian Popoviciu, East Carolina University Dr. Ciprian Popoviciu has over 22 years of experience working in various technical and leadership roles in the IT industry. He founded and led Nephos6, the first company to enable OpenStack for IPv6 and deployit in production. Prior to starting Nephos6 he managed the architecture team of Cisco’s Engineering Infrastructure Services organization where he defined the strategy and led the execution of the internal DC consolidation and transition to cloud. For the past 17 years Ciprian
Paper ID #29158Incorporating Practical Computing Skills into a Supplemental CS2Problem Solving CourseProf. Margaret Ellis, Virginia Tech Assistant Professor of Practice, Computer Science Department, Virginia Tech My research interests include examining ways to improve engineering educational environments to facil- itate student success, especially among underrepresented groups.Dr. Catherine T. Amelink, Virginia Tech Dr. Amelink is Acting Vice Provost for Learning Systems Innovation and Effectiveness, Virginia Tech. She is also an affiliate faculty member in the Departments of Engineering Education and Educational
Paper ID #29122Partnership to Prepare Students for Careers in the Emerging Field ofCybersecurityDr. James K. Nelson Jr. P.E., Texas A&M University Dr. James K. Nelson received a Bachelor of Civil Engineering degree from the University of Dayton in 1974. He received the Master of Science and Doctor of Philosophy degrees in civil engineering from the University of Houston. During his graduate study, Dr. Nelson specialized in structural engineering. He is a registered professional engineer in three states, a Chartered Engineer in the United Kingdom, and a fellow of the American Society of Civil Engineers. He is also a
Paper ID #30213Curri: A Curriculum Visualization System that Unifies CurricularDependencies with Temporal Student DataDr. Stephen Michael MacNeil, University of California San Diego Stephen’s research focuses on how people collaboratively make sense of complex, ’wicked’ problems. Wicked problems are dynamic and constantly changing. They involve multiple stakeholders, often with conflicting requirements. To address these challenges, Stephen develops sociotechnical systems that col- lect, organize, and use data to support reflection and collective action. He received his Ph.D. at UNC in Charlotte and is currently a
designed in the early 1980’s to reduceemissions by monitoring the performance of major engine component. The major component ofthe OBD is the Electronic Control Unit (ECU, Figure 3(a)), which receives inputs from varioussensors and control the actuators. OBDs provide digital trouble codes (DTCs) that can beaccessed via the Digital Link Connector (DLC, Figure 3(b)). (a) Components of OBD (b) OBD-II Port Figure 2. On-board Diagnostics (OBD)The latest version of OBD is OBD-II, which is available on all cars and light trucks built since1996. The OBD-II standard specifies the type of diagnostic connector and its pinout, theelectrical signaling protocols available, and the messaging
. Figure 5: System diagram for remote vacuum cleanerThe system has three main components: a mobile platform as the remote testbed system, alocal server is the gateway between the testbed and remote clients and the remote client. Themobile platform consists of a drive system, sensors for navigation, an embedded processor(Arduino board) for local control and data management, an XBee for wireless communicationwith the local server, and an IP camera for real time video. The IP camera has its owncommunication route via a WiFi channel. The video is then embedded within the GUI foruser monitoring. Images of completed mobile platform are shown in Figure 6. (b) Close up view of electronics. (a
Course Truck (1/16th scale) was used in this build 1. A Raspberry Pi 3B+ 2. A PCA9685 PWM controller. 3. A microSD card, at least 8GB in capacity. 4. SanDisk Extreme 32GB microSDHC card 5. An external battery to power Raspberry Pi. 6. A Pi Camera with ribbon cable. 7. An external battery to power Raspberry Pi. a. Mobile device power banks typically come with a USB A to Micro USB cable, which will fit the micro USB port on the Raspberry Pi. b. An Anker Astro E1 power bank was used in this build. 8. Dupont female to female jumper cables. a. This is to connect the Pi to PWM controller board. 9. A Pi Camera with ribbon cable. a. A fisheye lens is recommended, for a wider
National Cybersecurity AwarenessMonth in October. The module was delivered as follows: 1. Students were placed in teams of four, and first part of the ‘four corners exercise was introduced. Teams were asked to discuss whether it’s ethical to hack, and then add their names under one of the four statements given the phrase “It is Ethical to Hack”. (students did not have to come to a unanimous agreement in their teams): a. Strongly agree b. Agree c. Strongly disagree d. Disagree 2. Case studies were handed out; each group had a different type of case study, all related to ethical hacking and how the
, it should be clarified Athat in this model, there are two paths that can be taken in Astin’s Model, either: 1) Inputs − → B CEnvironment → − Outputs; or directly via 2) Inputs →− Outputs. Since we do not know if there is a A B Cgreater impact of −→ to → − , or to go directly though → − , we later assess if there are differences interms of rankings when we run the inputs and environment variables alone to predict graduationrates, or as a combined set.DatabaseTo assess what variables are most
estimatethe volume of a 3-dimensional ball and a ten dimensional hyperball.Uniform random variable is special in Monte Carlo methods and in computation – most psuedorandom number generators are designed to generate uniform random numbers. In MATLAB, forexample, the following command generates an m by m array of U(0,1) uniform random numbers.x = rand(m,n);To generate an U(a,b) uniform random numbers, one can simply scale the U(0,1)random numbers byx=rand(m,n)*(b-a)+a;Almost all other languages used for scientific computation have similar random numbergenerators.Ex. 3. Determine the mean, variance and standard deviation of a U(a,b) random variable.Non-uniform distributions are those whose probability density functions are not constant. Severalsimple
program are listed. Items (a) though (h) are more or less similarto Electronics Engineering Technology (EET) program and there is no need to cover them here.However, items (j) and (k) will be explained in detail. 2Courses in REET program include:(a)- COMMUNICATION SKILLS(b)- HUMANITIES, SOCIAL SCIENCES©- MATHEMATICS AND NATURAL SCIENCES(d)- PERSONAL AND PROFESSIONAL DEVELOPMENT(e)-TECH CORE COURSES(f)- AUTOMATION AND ELECTRICAL SYSTEMS(g)- INFORMATION SYSTEMS AND PROGRAMMING(h)- APPLICATION DEVELOPMENT(i)- TECHNOLOGY CAREER PREPARATION(j)- SENIOR PROJECT(k)-SPECIALIZED COURSESIn the following, specialized courses in REET program will be addressed.REET 100 Alternative Energy Technologies with LabThis
” ASEE- PSW 2018, Boulder, Co.8. N. Sharma, P. Scully-Power, and M. Blumenstein (2018) Shark Detection from Aerial Imagery Using Region-Based CNN, a Study. In: Mitrovic T., Xue B., Li X. (eds) AI 2018: Advances in Artificial Intelligence. AI 2018. Lecture Notes in Computer Science, vol 11320. Springer, Cham9. K. Jeremy, M. Johann, G. Kirk, H. Michael R (2016) ”Using unmanned aerial vehicles (UAVs) to investigate shark and ray densities in a shallow coral lagoon,” in Marine Ecology Progress Series, vol. 560, p. 237-242, November 2016.10. T. Ahilan, V.Aswin Adityan, S. Kailash (2015) ”Efficient Utilization of Unmanned Aerial Vehicles (UAV) for Fishing through Surveillance for Fishermen” in World Academy of Science, Engineering
; (b) Latinx students represent an increasing share of students in postsecondaryeducation; and (c) the rate of enrollment of Latinx students in postsecondary education has notkept pace with growth in the Latinx population in the U.S. [5,9].Data DashboardIn order to establish shared data management practices for measuring progress of collectiveefforts, a dashboard has been conceptualized to support the use of common measures andmanagement of the sets of data, which is a key component of the collective impact framework.This dashboard serves as a “meter” for institutions to track progress in their computingdisciplines, such as computer science or computer engineering, and to serve as a decision-makingtool to affect institutional/ departmental
course, creating a data collection form for each course, and sharing a deadline for data collection;(b) Sending out email notifications of the data collection schedule to the all instructors;(c) Monitoring the data collection status and sending out reminder emails to the instructors who are late (Data from student survey, employer survey will be entered by the assessment coordinator.); and(d) Performing automatic statistical analysis for collected data using the given criteria and formula to determine whether or not each SO is met. The SO evaluation criteria and formula can be changed. All the information from the process can be visible to all faculty so they are aware of the entire process.Establishment of Specialty Groups and
that should be followedwhen dealing with an IoT environment. The process includes the following phases [15]: 1. Initialization: In this phase, preparatory steps are taken before ever interacting with any device at the incident scene. During this phase, investigators should: (a) Understand how the IoT ecosystem works. (b) Identify potential data sources: Data can be stored at various locations within an IoT environment such as on IoT devices themselves in the form of internal memory or SD Cards, smartphones, or even in the cloud. Identifying where data is stored would allow investigators to determine what devices to acquire, what forensic tools would be needed, as well as what legal
as access time, cycle time, area on chip, the totalnumber of instructions executed, total number of hits and miss-rates. The selected tools helped usto simulate cache and in depth understanding the design factors. We compared the obtained resultswith those reported in the literature. In most cases, the results were comparable, and in some casesslight improved were achieved.Bibliography1. Hill M.D, and Smith A.J. Evaluating Associativity in CPU Caches. In: IEEE Transactions on Computer, 1989.2. Arjun Malik A., Bhatia M.S, Wu P., Zhe Qi, Cache Coherency Case Study: Cache Pipeline, Multilevel, Hierarchical, Semester Project, Dept. Computer Science, BGHI, Ohio, 2017.3. Duska, B. M., Marwood D, and Feeley M. J. The Measured Access
applications in their dayto day activities - ranging from advanced manufacturing, banking, and healthcare; b) code nightsinvolving parents and community; c) high school student participation in competitions like theGreat Computer Challenge and the National Youth Cyber Defense Competition; and 3) Establishprofessional development experiences for high school CTE teachers through face to face anddistance learning workshops. 4Getting the Project StartedThe project officially started in fall 2019 and got its “kickoff” with a getting to know each otherafternoon at the Granby High School where project team, college students, teachers and studentsfrom the high school met in the school’s library. The high school
complicated virtual environments. It is uncertain that the grant program will continue to offerfree credits in the future. Third, students create their own accounts and therefore usermanagement is a problem.In the future, we plan to develop more labs on commercial, public cloud systems and use VirtualPrivate Network (VPN) to connect students’ virtual machines with a central server to providebetter support and monitoring when needed. We are also considering integrating automaticassessment scripts through the central server on the public cloud to provide immediate feedback,which has been done successfully in some labs on our in-house, cloud-based systems.REFERENCES[1] D. Puthal, B. P. S. Sahoo, S. Mishra and S. Swain, "Cloud Computing Features, Issues
< 0.001 .979 3556.083 1.000 Lab 605.204 1 605.204 4.748 0.032 .057 4.748 .576 PPE 173.899 1 173.899 1.364 0.246 .017 1.364 .211Lab * PPE 307.181 1 307.181 2.410 0.125 .030 2.410 .335 Error 9943.074 78 127.475 Total 515395.000 82 Corrected 11345.720 81 Totala. R Squared=0.124 (Adjusted R Squared=0.090)b. Computed using alpha=0.054.6 Results of Factorial ANOVAFrom Table 3, we see that the interaction of lab enrollment by prior programming experience isnot statistically significant, but there is a statistically significant main effect for lab enrollment(F=4.748, df=1, 78, p=0.032). Effect z is very small for
be directly measured. Except for Q2, the treatmentgroup took slightly longer than the control group. T-test results show that the difference between (a) Number of Submissions (b) Time (in minutes) between a student’s First and Last Attempt Figure 2: Submission Details per Questionthe groups was statistically significant for Q2(p=0.019), Q4(p=0.003), Q7(p=0.004) andQ8(p=0.04). So the treatment group had more submissions on the Apply and Analyze-typequestions and also took longer to complete.Code Quality (RQ2)We also inspected the quality of the students solutions. The solutions for Analyze and Apply typeexercises results in very similar solutions
. This first year will serve as a pilot to gain insight and feedback into the survey andassignment.Below is the table containing KEEN framework category [3], KEEN related course outcomes[4], and the artifact(s) that will be used to assess each outcome. Appendix B provides theInstructor/Peer Video Rubric and Self-Reflection Rubric and appendix C contains the surveysgiven to the students. Category of KEEN KEEN Related Course Assessment Plan Related Course Outcome [4] Outcome [3] Related to Curiosity Take ownership of, and express Grade on Video interest in topic/expertise/project. Communication Present technical information Grade from rubric on these portions