AC 2007-1360: A STUDY ON THE PERFORMANCE OF BLUETOOTH AND IEEE802.11B COEXISTENCEWarith Al-Sulaimani, Modern College of Business and Science-Sultanate of Oman Warith Al-Sulaimani is a Lecturer and Consultant at the Modern College of Business and Science, Oman. Warith earned a Bachelor’s Degree in Electronic & Electrical Engineering from the University of Strathclyde (UK), a Diploma in Computers and Information Systems from Sultan Qaboos University (Oman) and Master’s Degree in Advanced Computer networking from Glasgow Caledonian University (UK). His primary research focus is in the areas of Wireless Networking, Internet Technologies and Network Security. He holds certifications in A
successful completion of the tests. Figure 2 shows the lab and test processflowcharts for the user interface. Upon successful login in Figure 5a, the student will be directedto the welcome page shown in Figure 5b. This stage includes an overview of the lab and recordsthe student’s information. Page 12.30.4 Proceedings of the 2007 American Society for Engineering Education Annual Conference & Exposition Copyright®2007, American Society for Engineering Education (a) (b) Figure 2. User Interface Flowcharts. (a) Lab flowchart, (b) Quiz flowchart
, energy, oil and gas refining, and transportation systems to achieve increasing efficiencies in overall system operation. As geographically-aware sensors and mobile devices (such as GPS-enabled cell phones ) become more ubiquitous and allow the public to capture where (a) the location of events happen or (b) data is gathered, such actions have potential impacts on future actions, strategic decisions and proposed policies. In particular, mobile GTs open the door to methods of reasoning and persuasion that would be impossible without the use of publically available spatial information. For example, during a disaster, location-based videos captured through cell phones at a disaster site can facilitate rapid allocation of resources
way ensures that the system“knows” the dependencies between concepts, and uses this knowledge to provide customizedinstruction and feedback to errors.For our purposes, we identified a set of concepts that are taught in our Java programminglanguage course at the Southern Taiwan University. Each concept is represented by a node in thegraph. We add a directed line from one concept (node) to another, if knowledge of the former is aprerequisite for understanding the latter. Thus, the DAG can be constructed manually with the aidof the course textbook. For example, consider one instance of the if statement in Java such as: if((a <= b) && (b <= c)) return true
. Using Snort as a Packet Logger 1. In the SSH terminal, capture and log packets in binary format by typing /usr/local/bin/snort -b -L /home/student/BinCapture (Note: If the log file is not specified, Snort will create binary logs in /var/log/snort with the name snort.log.[timestamp].) 2. Wait no shorter than 10 seconds and press Ctrl-C to stop sniffing. 3. Check the names of the generated file by typing ls /home/student 4. The binary log file name looks like this: BinCapture.1160008555, in which 1160008555 is the timestamp. Your log file should have a different timestamp. 5. You can read the binary log file using Wireshark or Tcpdump. Type /usr/sbin/tcpdump -r BinCapture.[timestamp] 6. Record the last
AC 2010-1206: A VIRTUAL ASSEMBLY SYSTEM ON AUTOMOBILE ENGINEFOR ASSEMBLY SKILLS TRAININGXiangchun Cheng, Zhejiang University of Technology College of Education, Zhejiang University of Technology, Hangzhou, Zhejiang, 310014, ChinaRong Gu, WWW.ZJUT.EDU.CN College of Education, Zhejiang University of Technology, Hangzhou, Zhejiang, 310014, ChinaMin Chen, Zhejiang University of TechnologyYingzhen Weng, Zhejiang University of Technology Page 15.110.1© American Society for Engineering Education, 2010 A Virtual Assembly System on Automobile Engine for Assembly Skills TrainingAbstractVirtual
of its above mentioned efforts. However, such anassessment is planned for the near future.Bibliography1. Hentea, M., H. Dhillon, and M. Dhillon. “Towards Changes in Information Security Education.” Journal ofInformation Technology Education, Volume 5, 2006. Page 12.226.92. Dark, M., J. Ekstrom, and B. Lunt. “Integrating Information Assurance and Security into IT Education: A Lookat the Model Curriculum and Emerging Practice.” Journal of Information Technology Education, Volume 5, 2006.3. Logan, P. “Crafting an Undergraduate Information Security Emphasis Within Information Technology.” Journalof Information Systems Education, 13 (3)4
Recognition, Article Published by HTG Systems.[3] Joyce, R. and G. Gupta, “Identity Authentication Based on keystroke Latencies,” Communications of ACM,Volume 33, Issue 2, ( February 1990). Retrieved on 8th March 2005.[4] Kung, S., Biometric Authentication: A Machine Learning Approach, First Edition , Published by Prentice Hall,PTR.[5] Obaidat, S. and B. Sadoun, Verification of Computer users using Keystroke Dynamics,” IEEE, Volume 27,Issue 2, (April 1997). Retrieved from IEEE on 16th February 2005.[6] Peacock, A., Learning User Keystroke Latency Patterns, acquired fromhttp://pel.cs.byu.edu/~alen/personal/CourseWork/cs572/KeystrokePaper/index.html [7] Umphress, D., and G. Williams, Identity Verification Through keyboard Characteristics
withefficient time and resource investments specifically improving data selection, data preparation,data quality (from all the information sources), resulting in precision and reduction in theassociated computing costsBibliography1. Agarwal,R.,Imielinski,T.,and Swami,A. Mining Associations between Sets of Items in Massive Databases. In proceedings of the ACM-SIGMOD 1993 International Conference on Management of Data, pages 207-216.2. Allen ,J.,Christie,A.,Fithen,W.,McHugh,J.,Pickel,J.,and Stoner, E. State of the Practice of Intrusion Detection Technologies. Technical report, Carnegie Mellon University.3. Gurley B. R. Intrusion Detection. Macmillan Computer Publishing. (MCP), Indianopolis. 2000.4. Barbara D. and Jajodia S. Applications
2006-1700: MEASURING USER SATISFACTION BY DETECTING ANDMEASURING EMOTIONSJohn Fernandez, Texas A&M University-Corpus Christi Dr. Fernandez is Assistant Professor of Computer Science in the Department of Computing and Mathematical Sciences. Having served 20 years in the U.S. Air Force and 10 years in private industry, Dr. Fernandez brings real-world experiences into the classroom for his students. His research interests are in HCI, information assurance, and software engineering.Phillip Wilson, Texas A&M University-Corpus Christi Mr. Phillip Wilson is a graduate assistant at Texas A&M University – Corpus Christi. He has a BS in Computer Science and Mathematics and is currently
and how this technique may be useful for making complex learningenvironments more navigable. The author believes advances in technology are poised tomake huge differences in the way we teach and the way students learn. Future work willinclude implementation of such tools in courses taught and comparative assessment ofstudent learning outcomes.References1. Novak, J. D.; Cañas, A. J. The Theory Underlying Concept Maps and How to Construct Them. cmap.ihmc.us/Publications/ResearchPapers/TheoryUnderlyingConceptMaps.pdf (November 20, 2008),2. Novak, J. D.; Gowin, D. B., Learning how to learn. Cambridge University Press: Cambridge, 1984.3. Milam, J. H., Jr.; Santo, S. A.; Heaton, L. A. Concept maps for web-based
. Fullyexploiting the power of these systems, however, is a significant challenge. We are developing ahigh performance computing and cyberinfrastructure signature area, and as part of this effort,working to develop a flexible world-class laboratory that can be used for both research andeducation. The goals of this effort are to: (a) educate a cohort of students from backgrounds incomputing and the domain sciences in the development, deployment, and use of highperformance computing and cyberinfrastructure systems; (b) establish a research facility tosupport discovery in high performance computing, cyberinfrastructure, and bioinformaticsamong a group of faculty and graduate students; and (c) seek new ways to effectively andefficiently share and leverage
# 1. 3. Print every table in a nice tabular form. 4. Write SQL queries to retrieve the same information that you did in project #1. 5. Print the English statement indicating the information that you are trying to retrieve. 6. Print each query and its result to show your DB works correctly. B. Object-Oriented Implementation: 1. Use DB4o to create the necessary classes for your database. 2. Use eclipse(optional) to create objects corresponding to the tuples that you entered in the Object-Relational model. 3. Print all the object of each extent in certain readable form. 4. Write queries to retrieve the same
Maybe 12 No 10 Yes 8 6 4 2 0 al b l ch Th ro ic U e ily R og a O T Fa h io ha D t ia ia he m rn yn N at ac ed ad eu m sy l ed pt ro E te P
AC 2010-1357: HOW A DATA MINING COURSE SHOULD BE TAUGHT IN ANUNDERGRADUATE COMPUTER SCIENCE CURRICULUMReza Sanati-Mehrizy, Utah Valley UniversityPaymon Sanati-Mehrizy, University of PennsylvaniaAfsaneh Minaie, Utah Valley UniversityChad Dean, Utah Valley University Page 15.646.1© American Society for Engineering Education, 2010 How a Data Mining Course Should be Taught in an Undergraduate Computer Science CurriculumAbstractData mining is a relatively new area of computer science that brings the concept of artificialintelligence, data structures, statistics, and database together. It is a high demand area becausemany organizations and businesses can benefit
graduation only), and the ability to add free text notes to anyrequirements. In initial versions of this interface, users were confused about where to startbuilding the requirement, so we added a clear starting point as shown in Figure 3.Figure 4 shows the interface used by staff members utilizing the system to enter requirements intoeach requirements unit. Figure 4(a) is an individual course that is used for a requirement. Asshown, it is possible to optionally enter a requisite grade or number of credit hours required foreach course. If these options are not specified, then CPAS defaults to a global setting that can bespecified per university policy. In Figure 4(b), we see several courses separated by Booleanoperators. In Figure 4(c), we
engineering. 2000: IEEE Computer Society Press; 1998.16. McKusick, M., et al., A fast file system for UNIX. ACM Transactions on Computer Systems (TOCS), 1984. 2(3): p. 181-197.17. Kleiman, S. Vnodes: An architecture for multiple file system types in Sun UNIX. 1986: Citeseer.18. Schroeder, B. and G. Gibson. Disk failures in the real world: What does an MTTF of 1,000,000 hours mean to you. 2007.19. Hey, T. and A. Trefethen, The Data Deluge: Grid Computing - Making the Global Infrastructure a Reality. 2003: John Wiley & Sons.20. Wang, F., et al. File system workload analysis for large scale scientific computing applications. 2004: Citeseer.21. Hargrove, W., F. Hoffman, and T. Sterling, The do-it-yourself supercomputer
requires careful project planning with the team mentor and facultymember. Time spent on the project is low in Week 1 and increases steadily until it occupiesstudents full-time in Weeks 8-10. In Week 3, groups make a presentation about their project’sresearch question and goals to the rest of the groups, citing major milestones and an anticipatedschedule. The project culminates in a five-page research paper, a poster presentation, and atechnology demo. Students present their posters and demos at a campus-wide REU ResearchSymposium. See Appendix B for a list of research projects from 2006-2008.HCI Course (Weeks 2 - 5) – LOs 1, 2, 3, 7, 8, 9, 12, 14This course introduces student to the key principles and theories of HCI and EIT. While in lessdepth
, Inc.9. Mammar, H.H. and F.T. Bernard, Incorporating Cognitive Styles into Adaptive Multimodal Interfaces.10. Witkin, H.A., et al., Field-dependent and field-independent cognitive styles and their educational implications. Review of Educational Research, 1977. 47: p. 1-64.11. Sadler-Smith, E. and B. Badger, Cognitive Style, Learning and Innovation. Technology Analysis & Strategic Management, 1998. 10(2): p. 247-265.12. Lo, J.-J. and P.-C. Shu, Identifying Learning Styles Through the Embedded Support Devices and Artificial Neural Network. 2002.13. Rumetshofer, H. and W. Wos. An Approach for Adaptable Learning Systems with Respect to Psychological Aspects. in SAC. 2003. Melbourne, FL.14. Chen, S.Y., A
.83-88.4. Daniel, E. M. and Wilson, H. N., “The Role of Dynamic Capabilities in E-Business Transformation,” European Journal of Information Systems, 12(3), 2003, pp. 282-296.5. Fano, A. and Gershman, A., “The Future of Business Services in the Age of Ubiquitous Computing,” Communications of the ACM, 45(12), 2002, pp. 63-87.6. Islam, N. and Fayad, M., “Toward ubiquitous acceptance of ubiquitous computing,” Communications of the ACM, 46(12), 2003, pp. 89-92.7. Kannan, P. K., Chang, A. M., and Whinston, A. B., “Wireless Commerce: Marketing Issues and Possibilities,” The 34th Hawaii International Conference on System Sciences, 2001.8. King, K. P., “Educational Technology Professional Development as
AC 2007-1219: TECHNOLOGICAL ASPECTS OF A SMART COTTAGE FORSENIORSRobert Walters, Pennsylvania State UniversityJohn Bertoty, Blueroof Technologies, Inc. Page 12.1375.1© American Society for Engineering Education, 2007 Development of a Smart Cottage for SeniorsAbstractThis paper presents the design, development and construction of a new kind of housing for seniorcitizens. A Smart Cottage for Seniors has been developed that is accessible, affordable and containstechnology to keep the seniors at home longer, safer and healthier. The cottage uses Universal designtechniques that ensure that the cottage will change with the needs of the occupants. A
AC 2010-62: A NEW MODEL FOR AUTHOR DRIVEN DIGITAL PUBLISHINGHugh Jack, Grand Valley State University Hugh Jack is a Professor in the School of Engineering at Grand Valley State University in Grand Rapids Michigan. His interests include Product Design and Manufacturing Engineering, with a particular focus in control systems. Page 15.67.1© American Society for Engineering Education, 2010 A New Model for Author Driven Digital PublishingAbstractBooks in print still dominate the college campus. The long-standing model for publishinginvolves corporate entities that take the work of an author and add value
AC 2008-1682: A PORTABLE VIRTUAL NETWORKING LAB FOR IT SECURITYINSTRUCTIONPeng Li, East Carolina UniversityTijjani Mohammed, East Carolina UniversityLee Toderick, East Carolina UniversityChengcheng Li, East Carolina UniversityPhilip Lunsford, East Carolina University Page 13.80.1© American Society for Engineering Education, 2008 A Portable Virtual Networking Lab for IT Security InstructionAbstractInformation and computer technology programs are facing several challenges such as rapiddevelopments of technologies, outdated lab equipment and materials, and increasing demands forremote labs from on-campus and distance education (DE) students. The purpose of this paper
AC 2008-2195: THE DEVELOPMENT OF A FORENSICS TOOL FOR WINDOWSMOBILE DEVICESKyle Lutes, Purdue University Kyle Lutes is an Associate Professor of Computer & Information Technology (CIT). He has authored/co-authored numerous papers, many of which were presented at national conferences or published in trade magazines/journals as well as two college textbooks. His background and interests cover all areas of software development, including mobile computing, client/server information systems, web application development, object-oriented programming (OOP), programming languages, software engineering, user interface design, and rapid application development (RAD). Kyle has been writing
AC 2009-1658: A WEB-BASED APPROACH TO SENIOR UNDERGRADUATEPROJECT MANAGEMENTHugh Jack, Grand Valley State UniversityChristopher Pung, Grand Valley State University Page 14.143.1© American Society for Engineering Education, 2009
AC 2009-2375: A SURVEY OF EMBEDDED DATABASE TECHNOLOGY FORMOBILE APPLICATIONSKyle Lutes, Purdue University Kyle Lutes is an Associate Professor for the Department of Computer & Information Technology (CIT) at Purdue University. Kyle joined the department in 1998 and is the chair of the department’s software development curriculum. His teaching and scholarly interests cover a broad range of software development areas including software applications for mobile devices, data-centered application development, and software entrepreneurialism. He has authored/co-authored numerous papers and two college textbooks on various software development-related topics. Prior to his current
AC 2008-89: BOUNDARIES AND FLOWS: A STRATEGY FOR INTRODUCINGINFORMATION SECURITY TO UNDERGRADUATESRichard Smith, U. of St. Thomas - St. Paul Assistant Professor at the University of St. Thomas and author of two books on information security. Page 13.255.1© American Society for Engineering Education, 2008 Boundaries and Flows: A Strategy for Introducing Information Security to UndergraduatesAbstractOutside of 2-year technical colleges, most postsecondary students aren’t offered coursework ininformation security until they have fulfilled upper division prerequisites in mathematics,software
AC 2010-1234: WIRELESS NETWORKS IN THE HEALTH CARE INDUSTRY: ADISCONNECTNipul Patel, Purdue University, North Central Page 15.1376.1© American Society for Engineering Education, 2010 WIRELESS NETWORKS IN THE HEALTH CARE INDUSTRY: A DISCONNECTAbstractWireless networking is relatively new and exciting technology for health care. Using handheldperipherals and wireless networking technologies, medical professional can have omnipresentaccess to patient information, clinical functions, and business functions. Wireless networks bringinformation access, data collection capabilities, and clinical applications closer to the point ofcare than is possible using
2006-331: PASSWORD AUDITING TOOLSMario Garcia, Texas A&M University-Corpus Christi Page 11.985.1© American Society for Engineering Education, 2006 Password Auditing ToolsAbstractA goal of computer system security is to prevent an attack, and authentication mechanisms canprevent a compromise on parts of a system. Most if not all forms of access are granted based ona single authentication scheme, and passwords are currently the most widely used authenticationmechanism. Weak passwords have been cited by experts from industry, government, andacademia as one of the most critical security threats to computer networks. However, variousapplications are
AC 2008-1581: A COURSE SEQUENCE FOR INTEGRATING PROBLEMSOLVING AND CRITICAL THINKING IN A HYBRID OUTCOME-BASED IS/ITCURRICULUMAzzedine Lansari, Zayed University Azzedine Lansari received a Ph.D. from North Carolina State University in 1992. From 1993-1998, he was a senior researcher at MANTECH, NC. He joined the College of Information Systems at Zayed University in 1998. Currently he is an Associate Professor in the College of Information Technology. His research interests include systems modeling, educational technology and curriculum design in Information Systems.Akram Al-Rawi, Zayed University Akram Al-Rawi is a Sun certified Java Programmer and a Professor of CIS at Zayed University